Information Technology Reference
In-Depth Information
References
1. Hellman, M.E.: A cryptanalytic time-memory trade off. IEEE Trans. Inform. The-
ory IT-26, 401-406 (1980)
2. Babbage, H.: Improved exhaustive search attacks on stream ciphers. In: European
Convention on Security and Detection, IEE Conference publication (408), pp. 161-
166 (1995)
3. Golic, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EURO-
CRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
4. Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream
ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13.
Springer, Heidelberg (2000)
5. Hong, J., Sarkar, P.: Rediscovery of time memory tradeoffs. Cryptology ePrint
Archive, Report 2005/090 (2005), http://eprint.iacr.org/
6. eStream: ECRYPT Stream Cipher Project. IST-2002-507932 (2004),
http://www.ecrypt.eu.org/stream
7. Quisquater, J., Standaert, F., Rouvroy, G., David, J., Legat, J.: A cryptanalytic
time-memory tradeoff: First FPGA implementation. In: Glesner, M., Zipf, P., Ren-
ovell, M. (eds.) FPL 2002. LNCS, vol. 2438, pp. 780-789. Springer, Heidelberg
(2002)
8. Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D.
(ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617-630. Springer, Heidelberg (2003)
9. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M.,
Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A Statistical Test Suite for
Random and Pseudorandom Number Generators for Cryptographic Applications
(2001), http://www.nist.gov
10. Englund, H., Johansson, T., Sonmez Turan, M.: A framework for chosen IV statis-
tical analysis of stream ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.)
INDOCRYPT 2007. LNCS, vol. 4859, pp. 268-281. Springer, Heidelberg (2007)
11. Sonmez Turan, M., Dooanaksoy, A., ¸ alik, ¸ .: Statistical analysis of synchronous
stream ciphers. In: SASC 2006: Stream Ciphers Revisited (2006)
12. Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC.
In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1-18. Springer, Heidelberg
(2001)
13. Jansen, C., Kolosha, A.: Cascade jump controlled sequence generator. eSTREAM,
ECRYPT Stream Cipher Project, Report 2005/022 (2005)
 
Search WWH ::




Custom Search