Sciweavers

135 search results - page 6 / 27
» Attacks on the RC4 stream cipher
Sort
View
92
Voted
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 3 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
LATINCRYPT
2010
14 years 10 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
115
Voted
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 5 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson
ASIACRYPT
2000
Springer
15 years 3 months ago
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoff curve TM2 = N2 for 1 T N. ...
Alex Biryukov, Adi Shamir
99
Voted
CRYPTO
2000
Springer
124views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Fast Correlation Attacks through Reconstruction of Linear Polynomials
The task of a fast correlation attack is to efficiently restore the initial content of a linear feedback shift register in a stream cipher using a detected correlation with the out...
Thomas Johansson, Fredrik Jönsson