A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
2] = 80, S the GGHN(n, m) PRGA algorithm, one can obtain a cycle of length 2 n starting with the initial state M Present a theoretical model in which indices are chosen independently and uniformly ... transition matrices M k ,M q M k (i, j) = Pr (A t+1 = j/A t = i) after change of k M q (i, j) = Pr (A t+1 = j/A t = i)after change of S M = M q × M k gives the full transition probabilities after one iteration ...doi:10.1007/978-3-642-25578-6_15 fatcat:qb5mqtias5edbioyxiy56i5hka
In addition, a key-recovery attack on the cipher has been successfully proposed. Then, a security evaluation of the Rakaposhi stream cipher identifies weaknesses of the cipher. ... This dissertation addresses cryptanalysis of several stream ciphers, and a hash function based on stream cipher. ... Acknowledgements I would like to express my sincere appreciation to my supervisor Professor Josef Pieprzyk for supporting of me at many levels: financial, intellectual and personal. ...doi:10.25949/19432694.v1 fatcat:326l7fzmxrhbrmv3ajek4d3m5e