Sciweavers

13 search results - page 3 / 3
» Key Collisions of the RC4 Stream Cipher
Sort
View
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
13 years 8 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
FSE
2007
Springer
94views Cryptology» more  FSE 2007»
13 years 11 months ago
Overtaking VEST
VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The...
Antoine Joux, Jean-René Reinhard
IACR
2011
122views more  IACR 2011»
12 years 4 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar