A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Evolution of GGHN Cipher
[chapter]
2011
Lecture Notes in Computer Science
2] = 80, S[3] the GGHN(n, m) PRGA algorithm, one can obtain a cycle of length 2 n starting with the initial state
M Present a theoretical model in which indices are chosen independently and uniformly ...
transition matrices M k ,M q M k (i, j) = Pr (A t+1 = j/A t = i) after change of k M q (i, j) = Pr (A t+1 = j/A t = i)after change of S M = M q × M k gives the full transition probabilities after one iteration ...
doi:10.1007/978-3-642-25578-6_15
fatcat:qb5mqtias5edbioyxiy56i5hka
Cryptanalysis of lightweight cryptographic algorithms
2022
In addition, a key-recovery attack on the cipher has been successfully proposed. Then, a security evaluation of the Rakaposhi stream cipher identifies weaknesses of the cipher. ...
This dissertation addresses cryptanalysis of several stream ciphers, and a hash function based on stream cipher. ...
Acknowledgements I would like to express my sincere appreciation to my supervisor Professor Josef Pieprzyk for supporting of me at many levels: financial, intellectual and personal. ...
doi:10.25949/19432694.v1
fatcat:326l7fzmxrhbrmv3ajek4d3m5e