A new distinguishing and key recovery attack on NGG stream cipher
From MaRDI portal
Publication:1032502
DOI10.1007/S12095-009-0012-4zbMath1178.94192OpenAlexW2055296824WikidataQ123354439 ScholiaQ123354439MaRDI QIDQ1032502
Rabeah Al-Zaidy, Aleksandar Kircanski, Amr M. Youssef
Publication date: 26 October 2009
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-009-0012-4
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Finding an internal state of RC4 stream cipher
- Attacks on the RC4 stream cipher
- A Practical Attack on Broadcast RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
This page was built for publication: A new distinguishing and key recovery attack on NGG stream cipher