Sciweavers

53 search results - page 4 / 11
» Fault Analysis of Stream Ciphers
Sort
View
IWSEC
2009
Springer
15 years 4 months ago
Improved Distinguishing Attacks on HC-256
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM com...
Gautham Sekar, Bart Preneel
CHES
2007
Springer
107views Cryptology» more  CHES 2007»
15 years 3 months ago
Secret External Encodings Do Not Prevent Transient Fault Analysis
Contrarily to Kerckhoffs’ principle, many applications of today’s cryptography still adopt the security by obscurity paradigm. Furthermore, in order to rely on its proven or e...
Christophe Clavier
76
Voted
INDOCRYPT
2007
Springer
15 years 3 months ago
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generali...
Håkan Englund, Thomas Johansson, Meltem S&ou...
CRYPTO
2000
Springer
108views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
Abstract. This paper investigates the design of S-boxes used for combining linear feedback shift register (LFSR) sequences in combination generators. Such combination generators ha...
Muxiang Zhang, Agnes Hui Chan
AFRICACRYPT
2008
Springer
15 years 3 months ago
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer 0002, Shahram Khazaei, Willi Meier