Open Access

On Distinguishing Attack Against the Reduced Version of the Cipher Nlsv2


Cite

[1] BABBAGE, S.-DE CANNI` ERE, CH.-CANTEAUT, A.-CID, C.-GILBERT, H.- -JOHANSSON, T.-PARKER, M.-PRENEEL, B.-RIJMEN, V.-ROBSHAW, M.: The eSTREAM Portfolio, Project eSTREAM web page, 2008, http://www.ecrypt.eu.org/stream/portfolio.pdf.Search in Google Scholar

[2] BIHAM, E.-BIRYUKOV, A.-DUNKELMAN, O.-RICHARDSON, E.-SHAMIR, A.: Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR, in: Selected Areas in Cryptography-SAC ’98, 5th Annual Internat. Workshop (S. Tavares et al., eds.), Kingston, Ontario, Canada, 1998, Lecture Notes in Comput. Sci., Vol. 1556, Springer, Berlin, 1999, pp. 362-375.Search in Google Scholar

[3] CHO, J. Y.-PIERPRZYK, J.: Crossword puzzle attack on NLS, Sel. Areas in Cryptogr. 2006, 1-15, research.ics.tkk.fi/publications/jcho/cpa-nls.pdf.Search in Google Scholar

[4] CHO, J. Y.-PIERPRZYK, J.: Linear distinguishing attack on NLS, Project eSTREAM web page, 2006, 1-10, http://www.ecrypt.eu.org/stream/papersdir/2006/018.pdf.Search in Google Scholar

[5] CHO, J. Y.-PIERPRZYK, J.: Multiple modular additions and crossword puzzle attackon NLSv2, Project eSTREAM web page, 2006, 1-19, http://www.ecrypt.eu.org/stream/papersdir/2006/051.pdf.Search in Google Scholar

[6] HAWKES, P.-PADDON, M.-ROSE, G. G.-DE VRIES, M. W.: Primitive specificationfor NLSv2, Project eSTREAM web page, 2007, 1-25, http://www.ecrypt.eu.org/stream/p3ciphers/nls/nls_p3.pdf.Search in Google Scholar

ISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics