Sciweavers

82 search results - page 12 / 17
» Algebraic Attacks on Stream Ciphers with Linear Feedback
Sort
View
CRYPTO
1993
Springer
168views Cryptology» more  CRYPTO 1993»
15 years 3 months ago
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...
CRYPTO
2001
Springer
147views Cryptology» more  CRYPTO 2001»
15 years 4 months ago
Correlation Analysis of the Shrinking Generator
Abstract. The shrinking generator is a well-known keystream generator composed of two linear feedback shift registers, LFSR1 and LFSR2, where LFSR1 is clock-controlled according to...
Jovan Dj. Golic
CCS
2006
ACM
15 years 3 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
15 years 6 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
CORR
2006
Springer
71views Education» more  CORR 2006»
14 years 11 months ago
Wreath Products in Stream Cipher Design
The paper develops a novel approach to stream cipher design: Both the state update function and the output function of the corresponding pseudorandom generators are compositions of...
Vladimir Anashin