In this paper we evaluate the resistance of stream ciphers with linear feedback against fast algebraic attacks. We summarize the current knowledge about fast algebraic attacks, develop new and more efficient algorithms to evaluate the resistance against fast algebraic attacks, study theoretical bounds on the attacks, and apply our methodology to the eSTREAM candidates SFINKS and WG as an illustration.status: publishe
We analyse asymptotically performances and convergence of fast iterative correlation attacks for the...
Algebraic attacks have been applied to several types of clock-controlled stream ciphers. However, to...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
In the present work we study algebraic attacks and cascading fast algebraic attack on stream ciphers...
Abstract. Most stream ciphers based on linear feedback shift registers (LFSR) are vulnerable to rece...
Stream ciphers are the oldest technique in cryptography subject and still applicable in the modern e...
Abstract. Due to their eciency, stream ciphers are widely used in practice (e.g., mobile phones) to ...
Due to their efficiency, stream ciphers are widely used in practice (e.g., mobile phones) to ensure ...
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear...
Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
This thesis presents new results on fast correlation attacks on stream ciphers. In particular, fast ...
We analyse asymptotically performances and convergence of fast iterative correlation attacks for the...
Algebraic attacks have been applied to several types of clock-controlled stream ciphers. However, to...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
In the present work we study algebraic attacks and cascading fast algebraic attack on stream ciphers...
Abstract. Most stream ciphers based on linear feedback shift registers (LFSR) are vulnerable to rece...
Stream ciphers are the oldest technique in cryptography subject and still applicable in the modern e...
Abstract. Due to their eciency, stream ciphers are widely used in practice (e.g., mobile phones) to ...
Due to their efficiency, stream ciphers are widely used in practice (e.g., mobile phones) to ensure ...
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear...
Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
This thesis presents new results on fast correlation attacks on stream ciphers. In particular, fast ...
We analyse asymptotically performances and convergence of fast iterative correlation attacks for the...
Algebraic attacks have been applied to several types of clock-controlled stream ciphers. However, to...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...