共 17 条
- [11] Baigneres T., Junod P., Vandenay S., How far can we go beyond linear cryptanalysis, Asiacrypt 2004, 3329, pp. 432-450, (2004)
- [12] Hell M., Johansson T., Brynielsson L., An overview of distinguishing attacks on stream ciphers, Cryptography and Communications, 1, 1, pp. 71-94, (2009)
- [13] Crowley P., Improved cryptanalysis of Py, Workshop on the State of the Art of Stream Ciphers (SASC 2006), pp. 52-60, (2006)
- [14] Liu Y.-Y., Qin T.-F., The key and IV setup of the stream ciphers HC-256 and HC-128, Networks Security, Wireless Communications and Trusted Computing, pp. 430-433, (2009)
- [15] Maitra S., Paul G., Raizada S., Some observations on HC-128, Designs, Codes and Cryptography, 57, 3, pp. 1-15, (2010)
- [16] Kircanski A., Youssef A.M., Differential fault analysis of HC-128, Africrypt 2010, 6055, pp. 261-278, (2010)
- [17] Paul G., Maitra S., Raizada S., A combinatorial analysis of HC-128, (2010)