An efficient state recovery attack on X-FCSR-256

9Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We describe a state recovery attack on the X-FCSR-256 stream cipher of total complexity at most 257.6. This complexity is achievable by requiring 249.3 output blocks with an amortized calculation effort of at most 28.3 table lookups per output block using no more than 233 table entries of precomputational storage. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Stankovski, P., Hell, M., & Johansson, T. (2009). An efficient state recovery attack on X-FCSR-256. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5665 LNCS, pp. 23–37). https://doi.org/10.1007/978-3-642-03317-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free