Sciweavers

44 search results - page 6 / 9
» A New Attack on the LEX Stream Cipher
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
INDOCRYPT
2005
Springer
14 years 1 months ago
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode
This article presents some new results concerning two algebraic attacks against the F-FCSR constructions proposed in [2]. We focus on the parameters of the stream ciphers proposed ...
Thierry P. Berger, Marine Minier
CRYPTO
2004
Springer
154views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
Håvard Molland, Tor Helleseth
INDOCRYPT
2005
Springer
14 years 1 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
IJWMC
2007
66views more  IJWMC 2007»
13 years 7 months ago
Grain: a stream cipher for constrained environments
Abstract. A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on two shift...
Martin Hell, Thomas Johansson, Willi Meier