scientific article; zbMATH DE number 1942441
From MaRDI portal
Publication:4409140
zbMath1026.94525MaRDI QIDQ4409140
Shai Halevi, Don Coppersmith, Charanjit S. Jutla
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420515.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (16)
Correlation attacks on combination generators ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ On the linear complexity of feedforward clock-controlled sequence ⋮ An ultrafast cryptographically secure pseudorandom number generator ⋮ Several MILP-Aided Attacks Against SNOW 2.0 ⋮ Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G ⋮ Differential cryptanalysis of PRESENT-like cipher ⋮ Loiss: A Byte-Oriented Stream Cipher ⋮ Fast Correlation Attacks: Methods and Countermeasures ⋮ Linear Approximations of Addition Modulo 2n-1 ⋮ On the best linear approximation of addition modulo \(2^n\) ⋮ Efficient deterministic and non-deterministic pseudorandom number generation ⋮ QUAD: A Practical Stream Cipher with Provable Security ⋮ Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks ⋮ Linearity properties of binary FCSR sequences ⋮ An overview of distinguishing attacks on stream ciphers
This page was built for publication: