Sciweavers

128 search results - page 2 / 26
» Linear Cryptanalysis of Stream Ciphers
Sort
View
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
13 years 10 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel
EUROCRYPT
1995
Springer
13 years 8 months ago
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma
Matsui's linear cryptanalysis for iterated block ciphers is generalized by replacing his linear expressions with I O sums. For a single round, an I O sum is the XOR of a balan...
Carlo Harpes, Gerhard G. Kramer, James L. Massey
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
13 years 11 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
IACR
2011
124views more  IACR 2011»
12 years 4 months ago
Zero-Correlation Linear Cryptanalysis of Block Ciphers
Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the security of block ciphers. This work introduces a novel extension of linear crypt...
Andrey Bogdanov, Vincent Rijmen
SACRYPT
1998
Springer
112views Cryptology» more  SACRYPT 1998»
13 years 8 months ago
Cryptanalysis of ORYX
Abstract. We present an attack on the ORYX stream cipher that requires only 25
David Wagner, Leone Simpson, Ed Dawson, John Kelse...