Sciweavers

68
Voted
FSE
2007
Springer
128views Cryptology» more  FSE 2007»
15 years 23 days ago
Differential-Linear Attacks Against the Stream Cipher Phelix
The previous key recovery attacks against Helix obtain the key with about 288 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 23...
Hongjun Wu, Bart Preneel