The alternative approach for the strong distinguishing attack
暂无分享,去创建一个
[1] Bart Preneel,et al. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition , 2006, ASIACRYPT.
[2] Josef Pieprzyk,et al. Distinguishing Attack on SOBER-128 with Linear Masking , 2006, ACISP.
[3] Jovan Dj. Golic,et al. Linear Cryptanalysis of Bluetooth Stream Cipher , 2002, EUROCRYPT.
[4] Alex Biryukov,et al. A Distinguishing Attack of SNOW 2.0 with Linear Masking Method , 2003, Selected Areas in Cryptography.
[5] Kaisa Nyberg,et al. Improved Linear Distinguishers for SNOW 2.0 , 2006, FSE.
[6] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[7] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[8] Markku-Juhani O. Saarinen. Chosen-IV Statistical Attacks on eSTREAM Stream Ciphers , 2006 .
[9] Shai Halevi,et al. Cryptanalysis of Stream Ciphers with Linear Masking , 2002, CRYPTO.
[10] Martin Hell,et al. An overview of distinguishing attacks on stream ciphers , 2009, Cryptography and Communications.