Sciweavers

82 search results - page 9 / 17
» Algebraic Attacks on Stream Ciphers with Linear Feedback
Sort
View
TIT
2008
130views more  TIT 2008»
14 years 11 months ago
Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity
Abstract. The recent algebraic attacks have received a lot of attention in cryptographic literature. The algebraic immunity of a Boolean function quantifies its resistance to the s...
Sihem Mesnager
IWSEC
2009
Springer
15 years 6 months ago
Improved Distinguishing Attacks on HC-256
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM com...
Gautham Sekar, Bart Preneel
EUROCRYPT
2006
Springer
15 years 3 months ago
How to Strengthen Pseudo-random Generators by Using Compression
Sequence compression is one of the most promising tools for strengthening pseudo-random generators used in stream ciphers. Indeed, adding compression components can thwart algebrai...
Aline Gouget, Hervé Sibert
81
Voted
FSE
2004
Springer
108views Cryptology» more  FSE 2004»
15 years 5 months ago
Algebraic Attacks on Summation Generators
We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses n LFSRs, an algebraic equation relating the key strea...
Dong Hoon Lee 0002, Jaeheon Kim, Jin Hong, Jae Woo...
FSE
2007
Springer
94views Cryptology» more  FSE 2007»
15 years 5 months ago
Overtaking VEST
VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The...
Antoine Joux, Jean-René Reinhard