Distinguishing Attacks on the Stream Cipher Py
From MaRDI portal
Publication:3618667
DOI10.1007/11799313_26zbMath1234.68095OpenAlexW2145084278MaRDI QIDQ3618667
Gautham Sekar, Souradyuti Paul, Bart Preneel
Publication date: 2 April 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11799313_26
Related Items (5)
Further non-randomness in RC4, RC4A and VMPC ⋮ Distinguishing attacks on stream ciphers based on arrays of pseudo-random words ⋮ Distinguishing Attack Against TPypy ⋮ Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses ⋮ New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
This page was built for publication: Distinguishing Attacks on the Stream Cipher Py