A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of length 2(98) words, the distinguisher has a detectable advantage. When the keystream length is around 2(120) the advantage is very close to 1. This shows certain weaknesses of Scream. In the process, the paper introduces new general ideas on how to improve the performance of linear distinguishing attacks on stream ciphers
Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In t...
SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this p...
This paper overviews basic theory on distinguishing attacks on stream ciphers. It illustrates underl...
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of len...
A linear distinguishing attack on the for stream cipher Scream is proposed. The attack uses approxim...
This paper presents a new simple distinguishing attack that can be applied on stream ciphers constru...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Many stream ciphers use irregular clocking to introduce nonlinearity to the keystream. We present th...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision atta...
Achterbahn stream cipher is proposed as a candidate for ECRYPT eSTREAM project which deals with key ...
Abstract. This paper describes some attacks on word-oriented stream ciphers that use a linear feedba...
Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of...
Abstract. Two general attacks that can be applied to all versions and variants of the Pomaranch stre...
Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In t...
SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this p...
This paper overviews basic theory on distinguishing attacks on stream ciphers. It illustrates underl...
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of len...
A linear distinguishing attack on the for stream cipher Scream is proposed. The attack uses approxim...
This paper presents a new simple distinguishing attack that can be applied on stream ciphers constru...
This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview ...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Many stream ciphers use irregular clocking to introduce nonlinearity to the keystream. We present th...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision atta...
Achterbahn stream cipher is proposed as a candidate for ECRYPT eSTREAM project which deals with key ...
Abstract. This paper describes some attacks on word-oriented stream ciphers that use a linear feedba...
Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of...
Abstract. Two general attacks that can be applied to all versions and variants of the Pomaranch stre...
Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In t...
SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this p...
This paper overviews basic theory on distinguishing attacks on stream ciphers. It illustrates underl...