Information Security and Cryptology
From MaRDI portal
Publication:5897813
DOI10.1007/11599548zbMath1151.94512OpenAlexW3011166217MaRDI QIDQ5897813
Martin Hell, Guang Gong, Yassir Nawaz, Kishan Chand Gupta
Publication date: 14 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11599548
Related Items
Some Proofs of Joint Distributions of Keystream Biases in RC4, On the structural weakness of the GGHN stream cipher, Further non-randomness in RC4, RC4A and VMPC, Cryptanalysis of the Full Spritz Stream Cipher, Distinguishing attacks on stream ciphers based on arrays of pseudo-random words, Attacks on the RC4 stream cipher, An overview of distinguishing attacks on stream ciphers, A new distinguishing and key recovery attack on NGG stream cipher, On the Evolution of GGHN Cipher, Analysis of RC4 and Proposal of Additional Layers for Better Security Margin