Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms
暂无分享,去创建一个
[1] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[2] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[3] Ron Steinfeld,et al. Cryptanalysis of WG-7: a lightweight stream cipher , 2012, Cryptography and Communications.
[4] Tao Huang,et al. Differential Attacks against Stream Cipher ZUC , 2012, ASIACRYPT.
[5] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[6] Guang Gong,et al. The weakness of integrity protection for LTE , 2013, WiSec '13.
[7] Bin Zhang,et al. Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) , 2010, ACNS.
[8] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[9] Guang Gong,et al. Communication System Security , 2012 .
[10] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[11] Guang Gong,et al. WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..
[12] Bart Preneel,et al. Chosen IV Attack on Stream Cipher WG , 2005 .
[13] Tor Helleseth,et al. Fast Discrete Fourier Spectra Attacks on Stream Ciphers , 2011, IEEE Transactions on Information Theory.
[14] Guang Gong,et al. Resilience to distinguishing attacks on WG-7 cipher and their generalizations , 2013, Cryptography and Communications.
[15] Jean-René Reinhard,et al. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 , 2011, Selected Areas in Cryptography.
[16] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[17] Alex Biryukov,et al. Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕ , 2010, ICETE.