Distinguishing attack

Results: 19



#Item
11Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
12Key schedule / ICE / Advantage / Skein / International Data Encryption Algorithm / Crypt / Cryptography / Block ciphers / Boomerang attack

SHA-3 Conference, March 2012, A Study of practical-time distinguishing attacks against round-reduced Threefish-256

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:00:24
13BSI / Boomerang attack / Block cipher

A Study of Practical-time Distinguishing Attacks Against Round-reduced Threefish-256

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:43:24
14RC4 / Distinguishing attack / Weak key / Keystream / Cryptology ePrint Archive / Cipher / Fluhrer /  Mantin and Shamir attack / Py / Cryptography / Stream ciphers / Pseudorandom number generators

1(4) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson1, Simon Josefsson2 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-29 06:53:59
15MAG / Stream ciphers / Keystream / Distinguishing attack

Distinguishing Attack on MAG Simon K¨ unzli and Willi Meier FHNW, 5210 Windisch (Switzerland) Abstract. MAG is a synchronous stream cipher submitted to the ECRYPT stream cipher

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:20:48
16Keystream / Distinguishing attack / Grain / KFB mode / Cryptography / Stream ciphers / T-function

Distinguishing Attacks on T-functions Simon K¨ unzli1,2 Pascal Junod3

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2007-05-21 09:22:00
17RC4 / Distinguishing attack / Keystream / Weak key / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

The Most Efficient Distinguishing Attack on VMPC and RC4A Yukiyasu Tsunoo1 , Teruo Saito2 , Hiroyasu Kubo2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-08 09:40:27
18Permutations / RC4 / Randomness / Cryptographically secure pseudorandom number generator / Fisher–Yates shuffle / Distinguishing attack / ICE / Tiny Encryption Algorithm / Py / Cryptography / Stream ciphers / Pseudorandom number generators

VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-20 09:15:57
19RC4 / Distinguishing attack / Randomness / Internet protocols / Secure communication / Advantage / Fisher–Yates shuffle / Related-key attack / Pseudorandom generator / Cryptography / Stream ciphers / Pseudorandom number generators

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE