Distinguishing attack

Results: 19



#Item
1Cryptography / Stream ciphers / RC4 / Keystream / Fluhrer /  Mantin and Shamir attack / Distinguishing attack

Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-02-22 02:10:52
2Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
3Algebra / Cryptography / Functional analysis / Generalized functions / Grain / Keystream / Correlation attack / Recurrence relation / Linear feedback shift register / Mathematics / Mathematical analysis / Stream ciphers

Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-14 10:29:32
4Random permutation / Pseudorandom permutation / Permutation / Block cipher / FO / Distinguishing attack / Mathematics / Combinatorics / Advantage

XLS is not a Strong Pseudorandom Permutation Mridul Nandi Indian Statistical Institute, Kolkata , Abstract. In FSE 2007, Ristenpart and Rogaway had described a generic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 03:16:12
5Monte Carlo methods / RC4 / Permutations / Randomness / Fisher–Yates shuffle / Cryptographically secure pseudorandom number generator / Distinguishing attack / Normal distribution / Stream cipher / Cryptography / Mathematics / Pseudorandom number generators

Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak www.vmpcfunction.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-06 10:02:01
6Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 09:18:30
7CBC-MAC / Block cipher modes of operation / Block cipher / Cryptographic hash function / One-key MAC / PMAC / Message authentication codes / Cryptography / CMAC

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-12 22:27:24
8Secure communication / Internet protocols / RC4 / Transport Layer Security / Weak key / Distinguishing attack / Related-key attack / Cipher suite / Cryptanalysis / Cryptography / Cryptographic protocols / Stream ciphers

Hacker Intelligence Initiative Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness Abstract

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2015-03-25 21:58:39
9Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-15 14:18:24
10RC4 / Distinguishing attack / Py / Permutation / Weak key / Related-key attack / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-03-18 09:06:03
UPDATE