Cryptology ePrint Archive: Report 2008/443

Available versions in chronological order


Transforming chosen IV attack into a key differential attack: how to break TRIVIUM and similar designs
Enes Pasalic

Key differentiation attacks on stream ciphers
Enes Pasalic


[ Cryptology ePrint archive ]