Abstract. Guess-and-determine attacks are based on guessing a subset of internal state bits and subsequently using these guesses together with the cipher’s output function to determine the value of the remaining state. These attacks have been successfully employed to break NFSR-based stream ciphers. The complexity of a guess-and-determine attack is directly related to the number of state bits used in the output function. Consequently, an opportunity exits for efficient cryptanalysis of NFSR-based stream ciphers if NFSRs used can be transformed to derive an equivalent stream cipher with a simplified output function. In this paper, we present a new technique for transforming NFSRs. We show how we can use this technique to transform NFSRs to e...
We describe a state recovery attack on the X-FCSR family of stream ciphers. In this attack we analys...
International audienceThe Feedback with Carry Shift Registers (FCSRs) have been proposed as an alter...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
Guess-and-determine attacks are based on guessing a subset of internal state bits and subsequently u...
© 2020 Ge YaoThe Nonlinear Feedback Shift Register (NLFSR) based stream cipher is becoming the mains...
Abstract: In this paper, we present a framework for guess-and-determine attack on stream ciphers tha...
Abstract. A new method for reducing the internal state size of stream cipher registers has been prop...
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine (GnD) at...
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine (GnD) at...
In this work we study cryptanalysis one of the most current stream ciphers A5/1. The cipher is used ...
Algebraic attacks on stream ciphers [9] recover the key by solving an overdefined system of multiva...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
International audienceA new method for reducing the internal state size of streamcipher registers ha...
Abstract. The internal state size of a stream cipher is supposed to be at least twice the key length...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
We describe a state recovery attack on the X-FCSR family of stream ciphers. In this attack we analys...
International audienceThe Feedback with Carry Shift Registers (FCSRs) have been proposed as an alter...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
Guess-and-determine attacks are based on guessing a subset of internal state bits and subsequently u...
© 2020 Ge YaoThe Nonlinear Feedback Shift Register (NLFSR) based stream cipher is becoming the mains...
Abstract: In this paper, we present a framework for guess-and-determine attack on stream ciphers tha...
Abstract. A new method for reducing the internal state size of stream cipher registers has been prop...
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine (GnD) at...
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine (GnD) at...
In this work we study cryptanalysis one of the most current stream ciphers A5/1. The cipher is used ...
Algebraic attacks on stream ciphers [9] recover the key by solving an overdefined system of multiva...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
International audienceA new method for reducing the internal state size of streamcipher registers ha...
Abstract. The internal state size of a stream cipher is supposed to be at least twice the key length...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
We describe a state recovery attack on the X-FCSR family of stream ciphers. In this attack we analys...
International audienceThe Feedback with Carry Shift Registers (FCSRs) have been proposed as an alter...
Our paper describes a particular class of digital cipher system that generates encryption keys using...