<--- Back to Details
First PageDocument Content
Keystream / HC-256 / Correlation attack / VEST / Differential cryptanalysis / Linear feedback shift register / Grain / KFB mode / Cryptography / Stream ciphers / RC4
Date: 2004-04-15 08:58:04
Keystream
HC-256
Correlation attack
VEST
Differential cryptanalysis
Linear feedback shift register
Grain
KFB mode
Cryptography
Stream ciphers
RC4

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 221,12 KB

Share Document on Facebook

Similar Documents

Motivation Introduction Fault Analysis on HC-256

DocID: 1l1Fp - View Document

HC-256 / Q / Stream ciphers / Advanced Encryption Standard / Py

Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ?

DocID: 1aqfW - View Document

SOSEMANUK / Trivium / Rabbit / Grain / HC-256 / MICKEY / CyaSSL / LEX / Computing / Stream ciphers / Salsa20 / ESTREAM

ICTECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

DocID: 12RUq - View Document

Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

DocID: 12OXX - View Document

Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

DocID: S2OL - View Document