메뉴 건너뛰기




Volumn 4593 LNCS, Issue , 2007, Pages 254-273

On the security of IV dependent stream ciphers

Author keywords

IV setup; PRNG; Provable security; Stream cipher

Indexed keywords

FUNCTION EVALUATION; NUMBER THEORY; SYSTEMS ANALYSIS; TREES (MATHEMATICS);

EID: 38149120938     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74619-5_17     Document Type: Conference Paper
Times cited : (21)

References (19)
  • 1
    • 38149054788 scopus 로고    scopus 로고
    • Armknecht, F., Lano, J., Preneel, B.: Extending the Resynchronization Attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, p. 19. Springer, Heidelberg (2004)
    • Armknecht, F., Lano, J., Preneel, B.: Extending the Resynchronization Attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, p. 19. Springer, Heidelberg (2004)
  • 3
    • 33746077698 scopus 로고    scopus 로고
    • QUAD: A Practical Stream Cipher with Provable Security
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Berbain, C., Gilbert, H., Patarin, J.: QUAD: a Practical Stream Cipher with Provable Security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004
    • Berbain, C.1    Gilbert, H.2    Patarin, J.3
  • 5
    • 84867937546 scopus 로고    scopus 로고
    • A new 128 bit key Stream Cipher : LEX. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/001
    • Biryukov, A.: A new 128 bit key Stream Cipher : LEX. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/001 (2005), http://www.ecrypt.eu.org/stream
    • (2005)
    • Biryukov, A.1
  • 6
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • Blum, M., Micali, S.: How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Comput. 13(4), 850-864 (1984)
    • (1984) SIAM J. Comput , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 7
    • 84974670663 scopus 로고
    • The Shrinking Generator
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22-39. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 8
    • 85028746172 scopus 로고
    • Resynchronization Weaknesses in Synchronous Stream Ciphers
    • Helleseth, T, ed, Advances in Cryptology, EU-ROCRYPT '93, Springer, Heidelberg
    • Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization Weaknesses in Synchronous Stream Ciphers. In: Helleseth, T. (ed.) Advances in Cryptology - EU-ROCRYPT '93. LNCS, vol. 765, pp. 159-167. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.765 , pp. 159-167
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 11
    • 0242571716 scopus 로고    scopus 로고
    • Gilbert, H.: The Security of One-Block-to-Many Modes of Operation. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 376-395. Springer, Heidelberg (2003)
    • Gilbert, H.: The Security of "One-Block-to-Many" Modes of Operation. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 376-395. Springer, Heidelberg (2003)
  • 13
    • 0022793132 scopus 로고
    • How to Construct Random Functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to Construct Random Functions. J. ACM 33(4), 792-807 (1986)
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 14
    • 38149052814 scopus 로고
    • Sparse Pseudorandom Distributions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Goldreich, O., Krawczyk, H.: Sparse Pseudorandom Distributions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 113-127. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 113-127
    • Goldreich, O.1    Krawczyk, H.2
  • 15
    • 84949426591 scopus 로고    scopus 로고
    • Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A Software-Efficient Stream Cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, 2365, pp. 195-209. Springer, Heidelberg (2002)
    • Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A Software-Efficient Stream Cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195-209. Springer, Heidelberg (2002)
  • 16
    • 35048826667 scopus 로고    scopus 로고
    • Joux, A., Muller, F.: A Chosen IV Attack Against Turing. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 194-207. Springer, Heidelberg (2004)
    • Joux, A., Muller, F.: A Chosen IV Attack Against Turing. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 194-207. Springer, Heidelberg (2004)
  • 17
    • 26444613466 scopus 로고    scopus 로고
    • Muller, F.: Differential Attacks against the Helix Stream Cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, Springer, Heidelberg (2004)
    • Muller, F.: Differential Attacks against the Helix Stream Cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, Springer, Heidelberg (2004)
  • 18
    • 84976667857 scopus 로고
    • On the Generation of Cryptographically Strong Pseudo-Random Sequences
    • Even, S, Kariv, O, eds, Automata, Languages and Programming, Springer, Heidelberg
    • Shamir, A.: On the Generation of Cryptographically Strong Pseudo-Random Sequences. In: Even, S., Kariv, O. (eds.) Automata, Languages and Programming, LNCS, vol. 115, pp. 544-550. Springer, Heidelberg (1981)
    • (1981) LNCS , vol.115 , pp. 544-550
    • Shamir, A.1
  • 19
    • 33746075070 scopus 로고
    • Theory and Applications of Trapdoor Function
    • Yao, A.: Theory and Applications of Trapdoor Function. In: Foundations of Cryptography FOCS 1982 (1982)
    • (1982) Foundations of Cryptography FOCS
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.