Sciweavers

13 search results - page 1 / 3
» Chosen IV Statistical Analysis for Key Recovery Attacks on S...
Sort
View
AFRICACRYPT
2008
Springer
13 years 11 months ago
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer 0002, Shahram Khazaei, Willi Meier
INDOCRYPT
2007
Springer
13 years 10 months ago
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generali...
Håkan Englund, Thomas Johansson, Meltem S&ou...
EUROCRYPT
2007
Springer
13 years 8 months ago
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
This paper shows that Py and Pypy are practically insecure. If one key is used with about 216 IVs with special differences, with high probability two identical keystreams will appe...
Hongjun Wu, Bart Preneel
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
13 years 8 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar
FSE
2007
Springer
94views Cryptology» more  FSE 2007»
13 years 10 months ago
Overtaking VEST
VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The...
Antoine Joux, Jean-René Reinhard