An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG (original) (raw)

Fast Algebraic Attacks on Stream Ciphers With Linear Feedback

Nicolas T. Courtois

Advances in Cryptology-CRYPTO 2003, 2003

View PDFchevron_right

Rewriting variables: The complexity of fast algebraic attacks on stream ciphers

P. Hawkes

Advances in Cryptology–CRYPTO 2004, 2004

View PDFchevron_right

Algebraic Cryptanalysis Of Stream Ciphers With Non Linear Update

Mehreen Afzal

2010

View PDFchevron_right

An Improved Attack on WG Stream Cipher

Arash Mirzaei

2010

View PDFchevron_right

Cryptanalysis of Stream Ciphers with Linear Masking

Charanjit Jutla

Lecture Notes in Computer Science, 2002

View PDFchevron_right

MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher

Riham AlTawy

Cryptography and Coding, 2017

View PDFchevron_right

Algebraic attacks on the crypto-1 stream cipher in mifare classic and oyster …

Nicolas T. Courtois

Early announcement of a research in …, 2008

View PDFchevron_right

Algebraic Cryptanalysis of A NLFSR Based Stream Cipher

Ashraf Masood

2008

View PDFchevron_right

Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding

Sergey Gryshakov

Journal of Mathematics and System Science, 2015

View PDFchevron_right

The Rabbit Stream Cipher - Design and Security Analysis

Mette Vesterager

2004

View PDFchevron_right

Udc 621.391:519.7 on the Computational Security of Randomized Stream Ciphers Proposed by Mihaljević and Imai

Sergey Gryshakov

2015

View PDFchevron_right

On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity

C. Carlet

Advances in Mathematics of Communications, 2008

View PDFchevron_right

Algebraic cryptanalysis of a small-scale version of stream cipher Lex

Vincent Rijmen

IET Information Security, 2010

View PDFchevron_right

Comparative Analysis of Structures And Attacks on Various Stream Ciphers

Faheem Masoodi

bvicam.ac.in, 4

View PDFchevron_right

AN ANALYSIS OF THE CONSTRUCTION OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS FOR STREAM CIPHERS

Mehreen Afzal

View PDFchevron_right

On guess and determine cryptanalysis of LFSR-based stream ciphers

Enes Pasalic

2009

View PDFchevron_right

On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners

An Braeken

Lecture Notes in Computer Science, 2006

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers

Nicolas T. Courtois

AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Cipher Components

Nicolas Courtois

Advanced Encryption Standard–AES, 2005

View PDFchevron_right

Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator

Louis Goubin

Lecture Notes in Computer Science

View PDFchevron_right

Stream Ciphers: A Comparative Study of Attacks and Structures

Syed Hamid

International Journal of Computer Applications, 2013

View PDFchevron_right

1 RPM : Lightweight Communication Security from Additive Stream Ciphers

Giovanni Di Crescenzo

2015

View PDFchevron_right

Algebraic Attacks and Decomposition of Boolean Functions

Enes Pasalic

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Heuristic guess-and-determine attacks on stream ciphers

hadi ahmadi

Iet Information Security, 2009

View PDFchevron_right

Security Evaluation of the K 2 Stream Cipher Editors

Deniz Toz

2011

View PDFchevron_right

An Improvement of Linearization-Based Algebraic Attacks

Abhijit Abhik Das

Lecture Notes in Computer Science, 2011

View PDFchevron_right

CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited

Nicolas Courtois

View PDFchevron_right

Algebraic Side Channel Attack on Trivium and Grain Ciphers

Mehreen Afzal

IEEE Access

View PDFchevron_right

The COS Stream Ciphers are Extremely Weak

Steve Babbage

View PDFchevron_right

Stream ciphers and the eSTREAM project

Vincent Rijmen

2010

View PDFchevron_right

How Fast Can Be Algebraic Attacks on Block Ciphers

Nicolas Courtois

online proceedings of Dagstuhl Seminar

View PDFchevron_right

On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers

Souvik Ray

Designs, Codes and Cryptography, 2017

View PDFchevron_right

Remarks on the security of the Alpha1 stream cipher

Chris Mitchell

View PDFchevron_right

Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants

Enes Pasalic

IACR Transactions on Symmetric Cryptology, 2018

View PDFchevron_right

Cryptanalysis Techniques for Stream Cipher: A Survey

Dr. Shadab Alam

View PDFchevron_right