Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their attacks in several ways by combining the standard attack with cryptanalytic techniques such as algebraic attacks and linear cryptanalysis. Our results show that using linear resync mechanisms should be avoided, and provide lower bounds for the nonlinearity required from a secure resync mechanism.status: publishe
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
Abstract: In this paper, we present an extension to the resynchronization attack on stream ciphers o...
Abstract. WG and LEX are two stream ciphers submitted to eStream – the ECRYPT stream cipher project....
A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision atta...
In some applications for synchronous stream ciphers frequent resynchronization or resynchronization ...
Abstract. In this paper we discuss power analysis of stream ciphers. In such attacks, one measures t...
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear...
In the present work we study algebraic attacks and cascading fast algebraic attack on stream ciphers...
In this paper we evaluate the resistance of stream ciphers with linear feedback against fast algebra...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Algebraic attacks have been applied to several types of clock-controlled stream ciphers. However, to...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
Abstract: In this paper, we present an extension to the resynchronization attack on stream ciphers o...
Abstract. WG and LEX are two stream ciphers submitted to eStream – the ECRYPT stream cipher project....
A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision atta...
In some applications for synchronous stream ciphers frequent resynchronization or resynchronization ...
Abstract. In this paper we discuss power analysis of stream ciphers. In such attacks, one measures t...
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear...
In the present work we study algebraic attacks and cascading fast algebraic attack on stream ciphers...
In this paper we evaluate the resistance of stream ciphers with linear feedback against fast algebra...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Algebraic attacks have been applied to several types of clock-controlled stream ciphers. However, to...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...