메뉴 건너뛰기




Volumn 4986 LNCS, Issue , 2008, Pages 48-56

Design of a new stream cipher-LEX

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE DESCRIPTION LANGUAGES; RIVERS;

EID: 48249132804     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68351-3_5     Document Type: Article
Times cited : (12)

References (11)
  • 1
    • 0029218160 scopus 로고
    • Improved "exhaustive search" attacks on stream ciphers
    • Babbage, S, ed, IEE Conference Publication, May
    • Babbage, S.: Improved "exhaustive search" attacks on stream ciphers. In: Babbage, S. (ed.) ECOS 1995 (European Convention on Security and Detection). IEE Conference Publication, vol. 408 (May 1995)
    • (1995) ECOS 1995 (European Convention on Security and Detection) , vol.408
    • Babbage, S.1
  • 3
    • 33745626422 scopus 로고    scopus 로고
    • Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved Time-Memory Trade-offs with Multiple Data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 110-127. Springer, Heidelberg (2006)
    • Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved Time-Memory Trade-offs with Multiple Data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 110-127. Springer, Heidelberg (2006)
  • 4
    • 84937419430 scopus 로고    scopus 로고
    • Cryptanalytic time/memory/data tradeoffs for stream ciphers
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 1-13
    • Biryukov, A.1    Shamir, A.2
  • 5
    • 84957610784 scopus 로고    scopus 로고
    • Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
    • Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
  • 6
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • Biham, E, ed, Advances in Cryptology, EUROCRYPT 2003, Springer, Heidelberg
    • Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) Advances in Cryptology - EUROCRYPT 2003. LNCS, pp. 345-359. Springer, Heidelberg (2003)
    • (2003) LNCS , pp. 345-359
    • Courtois, N.T.1    Meier, W.2
  • 8
    • 48249144533 scopus 로고    scopus 로고
    • eSTREAM, eSTREAM Optimized Code HOWTO (2005), http://www.ecrypt.eu.org/ stream/perf/
    • eSTREAM, eSTREAM Optimized Code HOWTO (2005), http://www.ecrypt.eu.org/ stream/perf/
  • 9
    • 84957381006 scopus 로고    scopus 로고
    • Cryptanalysis of alleged A5 stream cipher
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Golic, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 239-255
    • Golic, J.D.1
  • 11
    • 48249096083 scopus 로고    scopus 로고
    • Wu, H., Preneel, B.: Attacking the IV Setup of Stream Cipher LEX. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047. Springer, Heidelberg (2006)
    • Wu, H., Preneel, B.: Attacking the IV Setup of Stream Cipher LEX. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.