Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
From MaRDI portal
Publication:3506384
DOI10.1007/978-3-540-68164-9_16zbMath1142.94343OpenAlexW1601159549MaRDI QIDQ3506384
Simon Fischer, Shahram Khazaei, Willi Meier
Publication date: 13 June 2008
Published in: Progress in Cryptology – AFRICACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68164-9_16
Related Items (14)
Conditional differential cryptanalysis of 105 round Grain v1 ⋮ Conditional Differential Cryptanalysis of Trivium and KATAN ⋮ High order differential attacks on stream ciphers ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers ⋮ A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions ⋮ Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 ⋮ Attacking Bivium and Trivium with the Characteristic Set Method ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Numerical solvers and cryptanalysis ⋮ New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
Uses Software
Cites Work
This page was built for publication: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers