Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 457275, 7 pages
http://dx.doi.org/10.1155/2014/457275
Research Article

Cryptanalysis of Loiss Stream Cipher-Revisited

Information Science and Technology Institute, Zhengzhou 450000, China

Received 15 November 2013; Revised 5 May 2014; Accepted 5 May 2014; Published 27 May 2014

Academic Editor: Renat Zhdanov

Copyright © 2014 Lin Ding et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. ETSI/SAGE Specification, “Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3,” Document 2: ZUC Specification, Version: 1.6, 2011.
  2. ETSI/SAGE, “Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2,” Document 2: SNOW 3G Specification, version 1.1, 2006.
  3. C. Berbain, O. Billet, A. Canteaut et al., “Sosemanuk, a fast software-oriented stream cipher,” in New Stream Cipher Designs, vol. 4986 of Lecture Notes in Computer Science, pp. 98–118, Springer, Heidelberg, Germany, 2008. View at Google Scholar
  4. H. J. Wu, “The stream cipher HC-128,” in New Stream Cipher Designs, vol. 4986 of Lecture Notes in Computer Science, pp. 39–47, Springer, Heidelberg, Germany, 2008. View at Google Scholar
  5. M. Boesgaard, M. Vesterager, and E. Zenner, “The rabbit stream cipher,” in New Stream Cipher Designs, vol. 4986 of Lecture Notes in Computer Science, pp. 69–83, Springer, Heidelberg, Germany, 2008. View at Google Scholar
  6. D. J. Bernstein, “The salsa 20 family of stream ciphers,” in New Stream Cipher Designs, vol. 4986 of Lecture Notes in Computer Science, pp. 84–97, Springer, Heidelberg, Germany, 2008. View at Google Scholar
  7. D. Feng, X. Feng, W. Zhang, X. Fan, and C. Wu, “Loiss: a byte-oriented stream cipher,” in Coding and Cryptology, vol. 6639 of Lecture Notes in Computer Science, pp. 109–125, Springer, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  8. L. Ding and J. Guan, “Cryptanalysis of Loiss stream cipher,” The Computer Journal, vol. 55, no. 10, pp. 1192–1201, 2012. View at Publisher · View at Google Scholar
  9. A. Biryukov, A. Kircanski, and A. M. Youssef, “Cryptanalysis of the Loiss stream cipher,” in Selected Areas in Cryptography 2012, vol. 7707 of Lecture Notes in Computer Science, pp. 119–134, Springer, Heidelberg, Germany, 2012. View at Google Scholar
  10. J. Golić, “Cryptanalysis of alleged A5 stream cipher,” in Advances in Cryptology—EUROCRYPT ’97, vol. 1233 of Lecture Notes in Computer Science, pp. 239–255, Springer, Heidelberg, Germany, 1997. View at Google Scholar
  11. P. Hawkes and G. G. Rose, “Guess-and-determine attacks on SNOW,” in Selected Areas in Cryptography, vol. 2595 of Lecture Notes in Computer Science, pp. 37–46, Springer, Heidelberg, Germany, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  12. S. Babbage, C. de Cannière, J. Lano, B. Preneel, and J. Vandewalle, “Cryptanalysis of SOBER-t32,” in Fast Software Encryption, vol. 2887 of Lecture Notes in Computer Science, pp. 111–128, Springer, Heidelberg, Germany. View at Scopus
  13. X. Feng, J. Liu, Z. Zhou, C. Wu, and D. Feng, “A byte-based guess and determine attack on SOSEMANUK,” in Advances in Cryptology—ASIACRYPT 2010, vol. 6477 of Lecture Notes in Computer Science, pp. 146–157, Springer, Heidelberg, Germany, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  14. X. Feng, Z. Shi, C. Wu, and D. Feng, “On guess and determine analysis of Rabbit,” International Journal of Foundations of Computer Science, vol. 22, no. 6, pp. 1283–1296, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  15. L. Ding, S. K. Liu, Z. Y. Zhang, and J. Guan, “Guess and determine attack on ZUC based on solving nonlinear equations,” in Proceedings of the 1st International Workshop on ZUC Algorithm, 2010, report 2010/007.