Sciweavers

55 search results - page 5 / 11
» LILI Keystream Generator
Sort
View
DCC
2011
IEEE
13 years 2 months ago
Some observations on HC-128
In this paper, we use linear approximations of the addition modulo 2n of three n-bit integers to identify linear approximations of g1, g2, the feedback functions of HC-128. This, i...
Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Su...
AFRICACRYPT
2008
Springer
14 years 2 months ago
Correlated Keystreams in Moustique
Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different...
Emilia Käsper, Vincent Rijmen, Tor E. Bj&osla...
FSE
2004
Springer
96views Cryptology» more  FSE 2004»
14 years 1 months ago
A New Stream Cipher HC-256
HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector.
Hongjun Wu
CRYPTO
2001
Springer
147views Cryptology» more  CRYPTO 2001»
14 years 7 days ago
Correlation Analysis of the Shrinking Generator
Abstract. The shrinking generator is a well-known keystream generator composed of two linear feedback shift registers, LFSR1 and LFSR2, where LFSR1 is clock-controlled according to...
Jovan Dj. Golic
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 1 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak