Correlation attack

Results: 76



#Item
51Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
52Binary arithmetic / Linear feedback shift register / Correlation attack / Self-shrinking generator / Grain / QUAD / Turing / Shift register / Stream ciphers / Cryptography / Pseudorandom number generators

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-27 04:08:07
53Key management / Correlation attack / Key size / Advantage / ICE / MOSQUITO / Cipher / Pseudorandom number generators / Block ciphers / Cryptography / Stream ciphers / Keystream

Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,

Add to Reading List

Source URL: www.ii.uib.no

Language: English - Date: 2008-03-07 13:01:06
54Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
55Correlation attack / Linear feedback shift register / Weak key / Trivium / MICKEY / One-time pad / SOBER / Crypto-1 / Stream ciphers / Cryptography / Grain

A New Version of Grain-128 with Authentication Martin ˚ Agren1 , Martin Hell1 , Thomas Johansson1 , and Willi Meier2

Add to Reading List

Source URL: skew2011.mat.dtu.dk

Language: English - Date: 2011-02-07 09:17:31
56Keystream / VEST / Linear feedback shift register / QUAD / Shift register / Py / A5/1 / Correlation attack / Stream ciphers / Cryptography / MICKEY

The stream cipher MICKEY 2.0 Steve Babbage

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:54
57Linear feedback shift register / VEST / A5/1 / E0 / Cipher / Correlation attack / Achterbahn / Stream ciphers / Cryptography / Grain

Grain - A Stream Cipher for Constrained Environments Martin Hell1 , Thomas Johansson1 and Willi Meier2

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:54
58Keystream / Shift register / Correlation attack / A5/1 / Stream ciphers / Cryptography / MICKEY

The stream cipher MICKEY[removed]Steve Babbage

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-08-18 11:15:27
59Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
60Linear feedback shift register / Correlation attack / Keystream / NLFSR / A5/1 / Stream ciphers / Cryptography / Grain

Cryptanalysis of Grain Cˆ ome Berbain1 , Henri Gilbert1 , and Alexander Maximov2

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-02-13 07:41:32
UPDATE