Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Fast Correlation Attacks through Reconstruction of Linear Polynomials
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Improved Distinguishing Attacks on HC-256
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
The additive differential probability of ARX
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Image encryption using HC-128 and HC-256 stream ciphers
International Journal of Electronic Security and Digital Forensics
Improved distinguishers for HC-128
Designs, Codes and Cryptography
Differential fault analysis of HC-128
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Analysis of xorrotation with application to an HC-128 variant
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
On the sosemanuk related Key-IV sets
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Differential attacks against stream cipher ZUC
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Hi-index | 0.00 |
We present the 128-bit version of the stream cipher HC-256.