Distinguishing attacks on SOBER-t16 and t32

Patrik Ekdahl, Thomas Johansson

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

Two ways of mounting distinguishing attacks on two similar stream ciphers, SOBER-t16 and SOBER-t32, are proposed.. It results in distinguishing attacks faster than exhaustive key search on full SOBER-t16 and on SOBER-t32 without stuttering.
Original languageEnglish
Title of host publicationFast Software Encryption (Revised Papers)/Lecture Notes in Computer Science
PublisherSpringer
Pages210-224
Volume2365
ISBN (Print)978-3-540-44009-3
DOIs
Publication statusPublished - 2002
Event9th International Workshop, FSE 2002 - Leuven, Belgium
Duration: 2002 Feb 42002 Feb 6

Publication series

Name
Volume2365
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Workshop, FSE 2002
Country/TerritoryBelgium
CityLeuven
Period2002/02/042002/02/06

Bibliographical note

The information about affiliations in this record was updated in December 2015.
The record was previously connected to the following departments: Department of Information Technology (011014001)

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Fingerprint

Dive into the research topics of 'Distinguishing attacks on SOBER-t16 and t32'. Together they form a unique fingerprint.

Cite this