-
1
-
-
0029218160
-
Improved "exhaustive search" attacks on stream ciphers
-
Babbage, S, ed, IEE Conference Publication, May
-
Babbage, S.: Improved "exhaustive search" attacks on stream ciphers. In: Babbage, S. (ed.) ECOS 1995 (European Convention on Security and Detection). IEE Conference Publication, vol. 408 (May 1995)
-
(1995)
ECOS 1995 (European Convention on Security and Detection)
, vol.408
-
-
Babbage, S.1
-
3
-
-
33745626422
-
-
Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved Time-Memory Trade-offs with Multiple Data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 110-127. Springer, Heidelberg (2006)
-
Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved Time-Memory Trade-offs with Multiple Data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 110-127. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
5
-
-
84957610784
-
-
Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
-
Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
-
-
-
6
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
Biham, E, ed, Advances in Cryptology, EUROCRYPT 2003, Springer, Heidelberg
-
Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) Advances in Cryptology - EUROCRYPT 2003. LNCS, pp. 345-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, pp. 345-359
-
-
Courtois, N.T.1
Meier, W.2
-
8
-
-
48249144533
-
-
eSTREAM, eSTREAM Optimized Code HOWTO (2005), http://www.ecrypt.eu.org/ stream/perf/
-
eSTREAM, eSTREAM Optimized Code HOWTO (2005), http://www.ecrypt.eu.org/ stream/perf/
-
-
-
-
9
-
-
84957381006
-
Cryptanalysis of alleged A5 stream cipher
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Golic, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 239-255
-
-
Golic, J.D.1
-
11
-
-
48249096083
-
-
Wu, H., Preneel, B.: Attacking the IV Setup of Stream Cipher LEX. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047. Springer, Heidelberg (2006)
-
Wu, H., Preneel, B.: Attacking the IV Setup of Stream Cipher LEX. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047. Springer, Heidelberg (2006)
-
-
-
|