共 17 条
- [1] eSTREAM - The ecrypt stream cipher project, (2005)
- [2] Wu H.-J., A new stream cipher HC-256, FSE 2004, 3017, pp. 524-538, (2004)
- [3] Wu H.-J., The stream cipher HC-128, 4986, pp. 39-47, (2008)
- [4] Sekar G., Preneel B., Improved distinguishing attacks on HC-256, IWSEC 2009, 5824, pp. 38-52, (2009)
- [5] Coppersmith D., Halevi S., Jutla C., Cryptanalysis of stream ciphers with linear masking, CRYPTO 2002, 2442, pp. 515-532, (2002)
- [6] Ahmadian Z., Mohajeri J., Salmasizadeh M., Et al., A practical distinguisher for the Shannon cipher, The Journal of Systems and Software, 83, 4, pp. 543-547, (2010)
- [7] Chang Y.-Q., Jin C.-H., Linear distinguishing attack on Shannon algorithm, Journal of Electronics & Information Technology, 33, 1, pp. 190-193, (2011)
- [8] Keller N., Miller S.D., Distinguishing attack on stream ciphers based on arrays of pseudo-random words, Information Processing Letters, 110, 4, pp. 129-132, (2010)
- [9] Maitra S., Paul G., Gupta S., Attack on broadcast RC4 revisited, FSE 2011, 6733, pp. 199-217, (2011)
- [10] Sepehrdad P., Vaudenay S., Vuagnoux M., Statistical attack on RC4 distinguishing WPA, EUROCRYPT 2011, 6632, pp. 343-363, (2011)