Resynchronization Attacks on WG and LEX
暂无分享,去创建一个
[1] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[2] Joos Vandewalle,et al. Resynchronization Weaknesses in Synchronous Stream Ciphers , 1994, EUROCRYPT.
[3] Alex Biryukov,et al. Slide Attacks , 1999, FSE.
[4] Amr M. Youssef,et al. Cryptographic properties of the Welch-Gong transformation sequence generators , 2002, IEEE Trans. Inf. Theory.
[5] Jovan Dj. Golic,et al. On the Resynchronization Attack , 2003, FSE.
[6] Frederik Armknecht,et al. Extending the Resynchronization Attack , 2004, Selected Areas in Cryptography.
[7] Guang Gong,et al. The WG Stream Cipher , 2005 .
[8] Alex Biryukov,et al. Resynchronization Attack , 2005, Encyclopedia of Cryptography and Security.
[9] A. Biryukov. A New 128-bit Key Stream Cipher LEX , 2005 .