Sciweavers

168 search results - page 7 / 34
» Cryptanalysis of RC4-like Ciphers
Sort
View
SACRYPT
1998
Springer
112views Cryptology» more  SACRYPT 1998»
13 years 11 months ago
Cryptanalysis of ORYX
Abstract. We present an attack on the ORYX stream cipher that requires only 25
David Wagner, Leone Simpson, Ed Dawson, John Kelse...
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
PROVSEC
2010
Springer
13 years 5 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
JOC
2000
130views more  JOC 2000»
13 years 7 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
ISNN
2005
Springer
14 years 27 days ago
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the secur...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen