Cryptology ePrint Archive: Report 2007/230
Available versions in chronological order
20070619:194909 (posted 19-Jun-2007 19:49:09 UTC)
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: This is the full version of the paper to be published in the proceedings of ISC'07
20071123:202605 (posted 23-Nov-2007 20:26:05 UTC)
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: This is the full version of the paper to be published in the proceedings of ISC'07
20081016:200651 (posted 16-Oct-2008 20:06:51 UTC)
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: A shortened version of this paper appears in the proceedings of ISC 2007. We have fixed a typographical error that appears in the ISC proceedings version. Moreover, we found that the upper bound on the bias probability is more than what we had earlier calculated, thereby improving the attack presented at ISC'07. This is also accounted in this revised edition.
20081129:234250 (posted 29-Nov-2008 23:42:50 UTC)
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: A shortened version of this paper appears in the proceedings of ISC 2007. We have fixed a typographical error that appears in the ISC proceedings version. Moreover, we found that the upper bound on the bias probability is more than what we had earlier calculated, thereby improving the attack presented at ISC'07. This is also accounted in this revised edition.
20081129:234524 (posted 29-Nov-2008 23:45:24 UTC)
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: A shortened version of this paper appears in the proceedings of ISC 2007. We have fixed a typographical error that appears in the ISC proceedings version. Moreover, we found that the upper bound on the bias probability is more than what we had earlier calculated, thereby improving the attack presented at ISC'07. This is also accounted in this revised edition.
[
Cryptology ePrint archive
]