Distinguishing attack

In cryptography, a distinguishing attack is any form of cryptanalysis on data encrypted by a cipher that allows an attacker to distinguish the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
2015
2015
Common Scrambling Algorithm (CSA) has been used to encrypt european cable digital television signals since 1994. Although, the… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We analyze the concrete security and key sizes of theoretically sound lattice-based encryption schemes based on the “learning… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size… (More)
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Whirlpool is a hash function based on a block cipher that can be seen as a scaled up variant of the AES. The main difference is… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
SN3 is a synchronous stream cipher uses keys up to 768-byte. The cipher is constructed as an array base generator in which each… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision attack, is presented. The attack… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
We present a distinguishing attack on NLS which is one of the stream ciphers submitted to the eSTREAM project. We build the… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
2005
2005
Abstract Grain is one of the simplest ECRYPT Stream Cipher project Candidates which deals with key and IV of length 80 and 64… (More)
  • figure 1
Is this relevant?
2003
2003
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of length 298 words, the… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?