Sciweavers

82 search results - page 2 / 17
» Algebraic Attacks on Stream Ciphers with Linear Feedback
Sort
View
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
13 years 10 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel
AES
2004
Springer
151views Cryptology» more  AES 2004»
13 years 10 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers
Recently proposed algebraic attacks [2, 6] and fast algebraic attacks [1, 5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exp...
Philip Hawkes, Gregory G. Rose
ICISC
2004
120views Cryptology» more  ICISC 2004»
13 years 6 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
13 years 8 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol