Achterbahn stream cipher is proposed as a candidate for ECRYPT eSTREAM project which deals with key of length 80-bit. The linear distinguishing attack,which aims at distinguishing the keystream from purely random keystream,is employed to Achterbahn stream cipher. A linear distinguishing attack is based on linear sequential circuit approximation technique which distinguishes statistical bias in the keystream. In order to build the distinguisher, linear approximations of both non-linear feedback shift register (NLFSR) and the non-linear Boolean combining function are used. The keystream sequence generated by this algorithm consist a distinguisher with its probability bias . Thus, to distinguish the Achterbahn, we only need keystream bits an...
In this work we study cryptanalysis one of the most current stream ciphers A5/1. The cipher is used ...
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of len...
Abstract We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly...
We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM c...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
Achterbahn is one of the stream cipher proposals in the eSTREAM project. After the first version had...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Abstract. We determine the imbalances of the keystreams produced by Achterbahn-80 and Achterbahn-128...
Many stream ciphers use irregular clocking to introduce nonlinearity to the keystream. We present th...
A key recovery attack on the stream cipher Achterbahn-128/80, a cipher in the second phase of eSTREA...
Grain and Trivium are two hardware oriented synchronous stream ciphers proposed as the simplest cand...
Proposal for a secure stream cipher based on Linear Feedback Shift Registers (LFSR) is presented her...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
Abstract. This paper describes some attacks on word-oriented stream ciphers that use a linear feedba...
In this work we study cryptanalysis one of the most current stream ciphers A5/1. The cipher is used ...
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of len...
Abstract We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly...
We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM c...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
Achterbahn is one of the stream cipher proposals in the eSTREAM project. After the first version had...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Abstract. We determine the imbalances of the keystreams produced by Achterbahn-80 and Achterbahn-128...
Many stream ciphers use irregular clocking to introduce nonlinearity to the keystream. We present th...
A key recovery attack on the stream cipher Achterbahn-128/80, a cipher in the second phase of eSTREA...
Grain and Trivium are two hardware oriented synchronous stream ciphers proposed as the simplest cand...
Proposal for a secure stream cipher based on Linear Feedback Shift Registers (LFSR) is presented her...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
Abstract. This paper describes some attacks on word-oriented stream ciphers that use a linear feedba...
In this work we study cryptanalysis one of the most current stream ciphers A5/1. The cipher is used ...
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of len...
Abstract We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly...