<--- Back to Details
First PageDocument Content
Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4
Date: 2007-03-15 14:18:24
Py
ISAAC
Block cipher
VEST
Cipher
Distinguishing attack
HC-256
Blowfish
Symmetric-key algorithm
Cryptography
Stream ciphers
RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: www.ecrypt.eu.org

Download Document from Source Website

File Size: 201,59 KB

Share Document on Facebook

Similar Documents

Motivation  Introduction Fault Analysis on HC-256

Motivation Introduction Fault Analysis on HC-256

DocID: 1l1Fp - View Document

Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ?

Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ?

DocID: 1aqfW - View Document

ICTECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

ICTECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

DocID: 12RUq - View Document

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

DocID: 12OXX - View Document

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

DocID: S2OL - View Document