Title: | weaknesses of cosvd (2,128) stream cipher |
Author: | Zhang Bin
; Wu Hongjun
; Feng Dengguo
; Wang Hong
|
Conference Name: | 8th International Conference on Information Security an Cryptology (ICISC 2005)
|
Conference Date: | DEC 01-02,
|
Issued Date: | 2006
|
Conference Place: | Seoul, SOUTH KOREA
|
Keyword: | stream cipher
; COS cipher
; divide-and-conquer
; non-linear feedback shift register
|
Publisher: | INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005
|
Publish Place: | HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
|
Indexed Type: | SCI
|
ISSN: | 0302-9743
|
ISBN: | 3-540-33354-1
|
Department: | Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China. Katholieke Univ Leuven, Dept ESAT COSIC, Louvain, Belgium. Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing 100039, Peoples R China.
|
Sponsorship: | Minist Informat & Commun, Inst Informat Technol Assessment, Solmaze Co Ltd, K Bell Co Ltd, HAN Infocomm Co Ltd
|
English Abstract: | The COSvd (2,128) cipher was proposed at the ECRYPT SASC2004 workshop by Filiol et. al to strengthen the past COS (2,128) stream cipher. It uses clock-controlled non-linear feedback registers filtered by a highly non-linear output function and |
Citation statistics: |
|
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/12184
|
Appears in Collections: | 信息安全国家重点实验室_会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
weaknesses of cosvd stream cipher.pdf(480KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Zhang Bin,Wu Hongjun,Feng Dengguo,et al. weaknesses of cosvd (2,128) stream cipher[C]. 见:8th International Conference on Information Security an Cryptology (ICISC 2005). Seoul, SOUTH KOREA. DEC 01-02,.
|
|
|