Modes of Operation of Stream Ciphers
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Correlation Analysis of the Shrinking Generator
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
A New Keystream Generator MUGI
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Correlation Analysis of the Alternating Step Generator
Designs, Codes and Cryptography
Extensions of the Cube Attack Based on Low Degree Annihilators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
On a resynchronization weakness in a class of combiners with memory
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A framework for chosen IV statistical analysis of stream ciphers
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
Frontiers of Computer Science in China
Extending the resynchronization attack
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Non-randomness in eSTREAM candidates salsa20 and TSC-4
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A secure and efficient communication resume protocol for secure wireless networks
DAIS'05 Proceedings of the 5th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Resynchronization attacks on WG and LEX
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Fast and secure communication resume protocol for wireless networks
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
Analysis of the power consumption of secure communication in wireless networks
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Cryptanalysis of the F-FCSR stream cipher family
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
On the (im)possibility of practical and secure nonlinear filters and combiners
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Hybrid symmetric encryption using known-plaintext attack-secure components
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
A simple stream cipher with proven properties
Cryptography and Communications
On the security of IV dependent stream ciphers
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Differential and linear cryptanalysis using mixed-integer linear programming
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Cryptanalytic attacks on MIFARE classic protocol
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Hi-index | 0.00 |
In some applications for synchronous stream ciphers, the risk of loss of synchronization cannot be eliminated completely. In these cases frequent resynchronization or resynchronization upon request may be necessary. In the paper it is shown that this can lead to significant deterioration of the cryptographic security. A powerful general attack on nonlinearly filtered linear (over Z2) systems is presented. This attack is further refined to efficiently cryptanalyze a linear system with a multiplexer as output function.