In this paper we investigate the security of irregularly decimated stream ciphers. We present an improved correlation analysis of various irregular decimation mechanisms, which allows us to get much larger correlation probabilities than previously known methods. Then new correlation attacks are launched against the shrinking generator with Krawczyk’s parameters, LILI-∐, DECIM v2 and DECIM-128 to access the security margin of these ciphers. We show that the shrinking generator with Krawczyk’s parameters is practically insecure; the initial internal state of LILI-∐ can be recovered reliably in 272.5 operations, if 224.1-bit keystream and 274.1-bit memory are available. This disproves the designers’ conjecture that the complexity of any divide...
A new simple algorithm for fast correlation attacks on stream ciphers is presented. The advantages o...
Abstract. Many stream ciphers are built of a linear sequence generator and a non-linear output funct...
DECIM v2 is a stream cipher submitted to the ECRYPT stream cipher project (eSTREAM) and ISO/IEC 1803...
In this paper we investigate the security of irregularly decimated stream ciphers. We present an imp...
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we poi...
In this paper we demonstrate a fast correlation attack on the recently proposed stream cipher LILI-1...
The Shrinking Generator and the Alternating Step Generator are two of the most well known clock-cont...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
At Crypto’2000, Johansson and Jönsson proposed a fast correlation attack on stream ciphers based on ...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
AbstractThe shrinking generator is a simple keystream generator with applications in stream ciphers,...
This book offers a broad survey of all information made public - from 1993 until today - on keystrea...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
This thesis presents new results on fast correlation attacks on stream ciphers. In particular, fast ...
A new simple algorithm for fast correlation attacks on stream ciphers is presented. The advantages o...
Abstract. Many stream ciphers are built of a linear sequence generator and a non-linear output funct...
DECIM v2 is a stream cipher submitted to the ECRYPT stream cipher project (eSTREAM) and ISO/IEC 1803...
In this paper we investigate the security of irregularly decimated stream ciphers. We present an imp...
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we poi...
In this paper we demonstrate a fast correlation attack on the recently proposed stream cipher LILI-1...
The Shrinking Generator and the Alternating Step Generator are two of the most well known clock-cont...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
At Crypto’2000, Johansson and Jönsson proposed a fast correlation attack on stream ciphers based on ...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
AbstractThe shrinking generator is a simple keystream generator with applications in stream ciphers,...
This book offers a broad survey of all information made public - from 1993 until today - on keystrea...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
This thesis presents new results on fast correlation attacks on stream ciphers. In particular, fast ...
A new simple algorithm for fast correlation attacks on stream ciphers is presented. The advantages o...
Abstract. Many stream ciphers are built of a linear sequence generator and a non-linear output funct...
DECIM v2 is a stream cipher submitted to the ECRYPT stream cipher project (eSTREAM) and ISO/IEC 1803...