2004
DOI: 10.1007/978-3-540-24691-6_31
|View full text |Cite
|
Sign up to set email alerts
|

A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…The attack can be termed as successful only if complexities of all the stages are smaller than the exhaustive key search. Some examples of attack are [49,50]. High correlation immunity decreases the vulnerability to divide and conquer attack [51].…”
Section: Divide and Conquer Attackmentioning
confidence: 99%
“…The attack can be termed as successful only if complexities of all the stages are smaller than the exhaustive key search. Some examples of attack are [49,50]. High correlation immunity decreases the vulnerability to divide and conquer attack [51].…”
Section: Divide and Conquer Attackmentioning
confidence: 99%