#### Filter Results:

- Full text PDF available (6)

#### Publication Year

2001

2014

- This year (0)
- Last 5 years (1)
- Last 10 years (2)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Boris Pogorelov, Marina Pudovkina
- IACR Cryptology ePrint Archive
- 2003

Stream ciphers are often used in applications where high speed and low delay are a requirement. The Solitaire stream cipher was developed by B. Schneier as a paper-and-pencil cipher. Solitaire gets its security from the inherent randomness in a shuffled deck of cards. In this paper we investigate semigroups and groups properties of the Solitaire stream… (More)

- Marina Pudovkina
- IACR Cryptology ePrint Archive
- 2002

A large number of stream cipher were proposed and implemented over the last twenty years. In 1987 Rivest designed the RC4 stream cipher, which was based on a different and more software friendly paradigm. It was integrated into Microsoft Windows, Lotus Notes, Apple AOCE, Oracle Secure SQL, and many other applications, and has thus become the most widely… (More)

- Marina Pudovkina
- IACR Cryptology ePrint Archive
- 2001

Stream ciphers are often used in applications where high speed and low delay are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext… (More)

- Marina Pudovkina
- IACR Cryptology ePrint Archive
- 2001

In this paper the security of the stream cipher Vesta-2M is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. The complexity the attack is estimated the time of searching through the square root of all possible initial states.

- Marina Pudovkina
- Network Security
- 2001

- Marina Pudovkina, Alexander Toktarev
- CSS
- 2014

- Marina Pudovkina
- FPS
- 2011

- Marina Pudovkina
- IACR Cryptology ePrint Archive
- 2003

RC4 cipher is the most widely used stream cipher in software applications. It was designed by R. Rivest in 1987. In this paper we find the number of keys of the RC4 cipher generating initial permutations with the same cycle structure. We obtain that the distribution of initial permutations is not uniform.

- Marina Pudovkina
- IACR Cryptology ePrint Archive
- 2001

Stream ciphers are an important class of encryption algorithms, which are widely used in practice. In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintext attacks on this cipher. The complexities of these attacks can be estimated as 10 and 10.

- ‹
- 1
- ›