Ausgabe 2/2009
Inhalt (5 Artikel)
A combinatorial analysis of recent attacks on step reduced SHA-2 family
Somitra Kumar Sanadhya, Palash Sarkar
Factorization of determinants over finite fields and application in stream ciphers
Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
On biases of permutation and keystream bytes of RC4 towards the secret key
Goutam Paul, Subhamoy Maitra
A new distinguishing and key recovery attack on NGG stream cipher
Aleksandar Kircanski, Rabeah Al-Zaidy, Amr M. Youssef