Sciweavers

176 search results - page 2 / 36
» Distinguishing Attacks on T-Functions
Sort
View
DSN
2006
IEEE
13 years 9 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
IWSEC
2009
Springer
14 years 4 days ago
Improved Distinguishing Attacks on HC-256
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM com...
Gautham Sekar, Bart Preneel
EUROCRYPT
2005
Springer
13 years 11 months ago
Predicting and Distinguishing Attacks on RC4 Keystream Generator
In this paper we analyze the statistical distribution of the keystream generator used by the stream ciphers RC4 and RC4A. Our first result is the discovery of statistical biases o...
Itsik Mantin
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
13 years 9 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
14 years 11 days ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang