Sciweavers

CHINAF
2008
105views more  CHINAF 2008»
13 years 11 months ago
Fast correlation attack on stream cipher ABC v3
ABC v3 is a stream cipher proposed as a candidate to ECRYPT Estream Project which enters the second evaluation phase. Its key length is 128 bits. In this paper, We show that, ther...
Haina Zhang, Lin Li, Xiaoyun Wang
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 3 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
CRYPTO
1993
Springer
95views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Weak Keys for IDEA
Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES [2]. IDEA has a 128bit key and encrypts blocks of 64 bits. For a class of 2...
Joan Daemen, René Govaerts, Joos Vandewalle
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
14 years 3 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir
KES
2005
Springer
14 years 5 months ago
Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers
Abstract. In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the exp...
Pascal Bouvry, Gilbert Klein, Franciszek Seredynsk...