Sciweavers

362 search results - page 1 / 73
» Extending the Resynchronization Attack
Sort
View
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
13 years 10 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 2 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
13 years 8 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
FSE
2006
Springer
94views Cryptology» more  FSE 2006»
13 years 8 months ago
Resynchronization Attacks on WG and LEX
WG and LEX are two stream ciphers submitted to eStream
Hongjun Wu, Bart Preneel