Cryptology ePrint Archive: Report 2007/075

Available versions in chronological order


Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel


[ Cryptology ePrint archive ]