Review of algebraic attacks on stream ciphers
The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations system are described in detail.After analyzing t...
Saved in:
Main Authors: | ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2006-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74666414/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Performance research of the T′ algorithm over GF(2)
by: GUO Wen-ping 1, et al.
Published: (2011-01-01) -
Class of constructions of even variables Boolean function with optimum algebraic immunity
by: CHEN Yin-dong, et al.
Published: (2009-01-01) -
On the algebraic structure of Klimov-Shamir T-function
by: LUO Yong-long, et al.
Published: (2008-01-01) -
Stochastic job stream scheduling method for cipher chip with multi-cryptography
by: Li LI, et al.
Published: (2016-12-01) -
Cryptanalysis of the Vesta-2M stream cipher
by: GUAN Jie
Published: (2003-01-01)