Cryptology ePrint Archive: Report 2007/230

Available versions in chronological order


New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: This is the full version of the paper to be published in the proceedings of ISC'07

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: This is the full version of the paper to be published in the proceedings of ISC'07

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: A shortened version of this paper appears in the proceedings of ISC 2007. We have fixed a typographical error that appears in the ISC proceedings version. Moreover, we found that the upper bound on the bias probability is more than what we had earlier calculated, thereby improving the attack presented at ISC'07. This is also accounted in this revised edition.

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: A shortened version of this paper appears in the proceedings of ISC 2007. We have fixed a typographical error that appears in the ISC proceedings version. Moreover, we found that the upper bound on the bias probability is more than what we had earlier calculated, thereby improving the attack presented at ISC'07. This is also accounted in this revised edition.

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
Publication Info: A shortened version of this paper appears in the proceedings of ISC 2007. We have fixed a typographical error that appears in the ISC proceedings version. Moreover, we found that the upper bound on the bias probability is more than what we had earlier calculated, thereby improving the attack presented at ISC'07. This is also accounted in this revised edition.


[ Cryptology ePrint archive ]