A distinguishing attack of SNOW 2.0 with linear masking method

42Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher. Our attack requires 2225 output words (2230 bits) and 2225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence. © Springer-Verlag Berlin Heidelberg 2004.

References Powered by Scopus

Linear cryptanalysis method for DES cipher

1921Citations
N/AReaders
Get full text

A new version of the stream cipher SNOW

186Citations
N/AReaders
Get full text

Cryptanalysis of stream ciphers with linear masking

91Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Sosemanuk, a fast software-oriented stream cipher

86Citations
N/AReaders
Get full text

Improved linear distinguishers for SNOW 2.0

80Citations
N/AReaders
Get full text

Fast computation of large distributions and its cryptographic applications

29Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Watanabe, D., Biryukov, A., & De Cannière, C. (2004). A distinguishing attack of SNOW 2.0 with linear masking method. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3006, 222–233. https://doi.org/10.1007/978-3-540-24654-1_16

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 16

62%

Professor / Associate Prof. 4

15%

Lecturer / Post doc 3

12%

Researcher 3

12%

Readers' Discipline

Tooltip

Computer Science 21

78%

Mathematics 4

15%

Design 1

4%

Physics and Astronomy 1

4%

Article Metrics

Tooltip
Mentions
References: 1

Save time finding and organizing research with Mendeley

Sign up for free