Sciweavers

541 search results - page 5 / 109
» A generic attack to ciphers
Sort
View
FSE
2006
Springer
94views Cryptology» more  FSE 2006»
13 years 10 months ago
Resynchronization Attacks on WG and LEX
WG and LEX are two stream ciphers submitted to eStream
Hongjun Wu, Bart Preneel
IEEEIAS
2009
IEEE
14 years 1 months ago
Guess and Determine Attack on SOSEMANUK
SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the strea...
Ding Lin, Guan Jie
FSE
2007
Springer
153views Cryptology» more  FSE 2007»
14 years 1 months ago
A New Attack on 6-Round IDEA
IDEA is a 64-bit block cipher with 128-bit keys introduced
Eli Biham, Orr Dunkelman, Nathan Keller
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
13 years 10 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 8 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel