Cryptology ePrint Archive: Report 2008/443
Available versions in chronological order
20081020:192544 (posted 20-Oct-2008 19:25:44 UTC)
Transforming chosen IV attack into a key differential attack: how to break TRIVIUM and similar designs
Enes Pasalic
20081205:162637 (posted 05-Dec-2008 16:26:37 UTC)
Key differentiation attacks on stream ciphers
Enes Pasalic
[
Cryptology ePrint archive
]