메뉴 건너뛰기




Volumn 4859 LNCS, Issue , 2007, Pages 268-281

A framework for chosen IV statistical analysis of stream ciphers

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; POLYNOMIALS; PROBLEM SOLVING; STATISTICAL METHODS;

EID: 38349025631     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77026-8_20     Document Type: Conference Paper
Times cited : (78)

References (10)
  • 1
    • 85028746172 scopus 로고
    • Resynchronization weaknesses in synchronous stream ciphers
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization weaknesses in synchronous stream ciphers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 159-167. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 159-167
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 2
    • 0242404251 scopus 로고    scopus 로고
    • Golic, J.D., Morgan, G.: On the resynchronization attack. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 100-110. Springer, Heidelberg (2003)
    • Golic, J.D., Morgan, G.: On the resynchronization attack. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 100-110. Springer, Heidelberg (2003)
  • 3
    • 24144437725 scopus 로고    scopus 로고
    • Armknecht, F., Lano, J., Preneel, B.: Extending the resynchronization attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, pp. 19-38. Springer, Heidelberg (2004)
    • Armknecht, F., Lano, J., Preneel, B.: Extending the resynchronization attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 19-38. Springer, Heidelberg (2004)
  • 4
    • 38349010225 scopus 로고    scopus 로고
    • Filiol, E.: A new statistical testing for symmetric ciphers and hash functions. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, 2119, pp. 21-35. Springer, Heidelberg (2001)
    • Filiol, E.: A new statistical testing for symmetric ciphers and hash functions. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 21-35. Springer, Heidelberg (2001)
  • 5
    • 78349292370 scopus 로고    scopus 로고
    • Chosen-iv statistical attacks on estream stream ciphers. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2006/013
    • Saarinen, M.J.O.: Chosen-iv statistical attacks on estream stream ciphers. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/013 (2006), http://www.ecrypt.eu.org/stream
    • (2006)
    • Saarinen, M.J.O.1
  • 7
    • 56349117175 scopus 로고    scopus 로고
    • Trivium - specifications. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/030 , available at
    • De Cannière, C., Preneel, B.: Trivium - specifications. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/030 (2005), available at http://www.ecrypt.eu.org/stream
    • (2005)
    • De Cannière, C.1    Preneel, B.2
  • 10
    • 84949223752 scopus 로고    scopus 로고
    • Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, 2259, pp. 1-24. Springer, Heidelberg (2001)
    • Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1-24. Springer, Heidelberg (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.