Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In this paper, we apply linear cryptanalysis to a chaotic stream cipher which was designed by strictly using the basic design criterion of cryptosystem – confusion and diffusion. We show that this well-designed chaos-based stream cipher is still insecure against distinguishing attack. This distinguishing attack promotes the further improvement of the cipher
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
This paper points out that a class of chaotic stream ciphers proposed recently is not secure enough,...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Abstract We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
In this paper, we are concerned with the security of block ciphers against linear cryptanalysis and ...
Abstract. In this paper, we are concerned with the security of block ciphers against linear cryptana...
Abstract. In this paper we re-visit distinguishing attacks. We show how to generalize the notion of ...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
This paper points out that a class of chaotic stream ciphers proposed recently is not secure enough,...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Abstract We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
In this paper, we are concerned with the security of block ciphers against linear cryptanalysis and ...
Abstract. In this paper, we are concerned with the security of block ciphers against linear cryptana...
Abstract. In this paper we re-visit distinguishing attacks. We show how to generalize the notion of ...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...