Two ways of mounting distinguishing attacks on two similar stream ciphers, SOBER-t16 and SOBER-t32, are proposed. It results in distinguishing attacks faster than exhaustive key search on full SOBER-t16 and on SOBER-t32 without stuttering.
CITATION STYLE
Ekdahl, P., & Johansson, T. (2002). Distinguishing attacks on SOBER-t16 and t32. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2365, pp. 210–224). Springer Verlag. https://doi.org/10.1007/3-540-45661-9_16
Mendeley helps you to discover research relevant for your work.