2008
DOI: 10.1007/978-3-540-89641-8_17
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of MV3 Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…In addition, we extended the technique, allowing it to handle more complicated update and output rules, and used it to mount a distinguishing attack on the cipher mv3 [9], requiring less than 2 82 words of output. 10 The values of the 22 optimal quadruples (i 1 , i 1 + l, i 2 , i 2 + l) are: (0, 1, 14, 15), (0, 1, 18, 19), (1,2,15,16), (3,4,21,22), (4,5,18,19), (4,5,22,23), (5,6,19,20), (5,6,23,24), (6,7,20,21), (6,7,24,25), (7,8,21,22), (7,8,25,26), (8,9,22,23), (8,9,26,27), (9,10,…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In addition, we extended the technique, allowing it to handle more complicated update and output rules, and used it to mount a distinguishing attack on the cipher mv3 [9], requiring less than 2 82 words of output. 10 The values of the 22 optimal quadruples (i 1 , i 1 + l, i 2 , i 2 + l) are: (0, 1, 14, 15), (0, 1, 18, 19), (1,2,15,16), (3,4,21,22), (4,5,18,19), (4,5,22,23), (5,6,19,20), (5,6,23,24), (6,7,20,21), (6,7,24,25), (7,8,21,22), (7,8,25,26), (8,9,22,23), (8,9,26,27), (9,10,…”
Section: Discussionmentioning
confidence: 99%
“…The material in Section 4 concerns an attack on the mv3 stream cipher. After writing up a description of our results, we learned that essentially identical arguments -but with important miscalculations -had simultaneously been published in [15]. For the sake of completeness we include an appendix reconciling the two attacks.…”
Section: Introductionmentioning
confidence: 94%
See 3 more Smart Citations