Sciweavers

74 search results - page 7 / 15
» A Key Recovery Attack on Edon80
Sort
View
FSE
2007
Springer
128views Cryptology» more  FSE 2007»
13 years 11 months ago
Differential-Linear Attacks Against the Stream Cipher Phelix
The previous key recovery attacks against Helix obtain the key with about 288 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 23...
Hongjun Wu, Bart Preneel
CRYPTO
2004
Springer
154views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
Håvard Molland, Tor Helleseth
ASIACRYPT
2011
Springer
12 years 7 months ago
Cryptanalysis of ARMADILLO2
ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper we propose a me...
Mohamed Ahmed Abdelraheem, Céline Blondeau,...
ASIACRYPT
2008
Springer
13 years 9 months ago
A New Attack on the LEX Stream Cipher
Abstract. In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher...
Orr Dunkelman, Nathan Keller
EUROCRYPT
2011
Springer
12 years 11 months ago
Statistical Attack on RC4 - Distinguishing WPA
Abstract. In this paper we construct several tools for manipulating pools of biases in the analysis of RC4. Then, we show that optimized strategies can break WEP based on 4000 pack...
Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux