
10. D. Coppersmith, S. Halevi, and C. Jutla. Cryptanalysis of stream ciphers with linear masking.
In M. Yung, editor, Proc. Crypto 2002, volume 2442 of LNCS, pages 515–532. Springer,
2002.
11. N. Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In D. Boneh,
editor, Proc. Crypto 2003, volume 2729 of LNCS, pages 176–194. Springer, 2003.
12. P. Crowley and S. Lucks. Bias in the LEVIATHAN stream cipher. In M. Matsui, editor, Proc.
Fast Software Encryption 2001, volume 2355 of LNCS, pages 211–218. Springer, 2002.
13. J. Daemen, R. Govaerts, and J. Vandewalle. Resynchronisation weakness in synchronous
stream ciphers. In T. Helleseth, editor, Proc. Eurocrypt ’93, volume 765 of LNCS, pages
159–167. Springer, 1994.
14. E. Dawson, A. Clark, J. Goli
´
c, W. Millan, L. Penna, and L. Simpson. The LILI-128
keystream generator.
http://www.isrc.qut.edu.au/resource/lili/
lili
nessie
workshop.pdf.
15. P. Ekdahl and T. Johansson. SNOW - a new stream cipher.
http://www.it.lth.se/cryptology/snow/. NESSIE project submission.
16. P. Ekdahl and T. Johansson. A new version of the stream cipher SNOW. In H. Heys and
K. Nyberg, editors, Proc. SAC 2002, volume 2595 of LNCS, pages 47–61. Springer, 2002.
17. P. Ekdahl and T. Johansson. Another attack on A5/1. IEEE Trans. Information Theory,
49(1):284–289, 2003.
18. H. Finney. An RC4 cycle that can’t happen. Newsgroup post to sci.crypt, September 1994.
19. S. Fluhrer. Cryptanalysis of the SEAL 3.0 pseudorandom function family. In M. Matsui, ed-
itor, Proc. Fast Software Encryption 2001, volume 2355 of LNCS, pages 135–143. Springer,
2002.
20. S. Fluhrer and D. McGrew. Statistical analysis of the alleged RC4 keystream generator.
In B. Schneier, editor, Proc. Fast Software Encryption 2000, volume 1978 of LNCS, pages
19–30. Springer, 2001.
21. J. Goli
´
c. Cryptanalysis of alleged A5 stream cipher. In W. Fumy, editor, Proc. Eurocrypt
’97, volume 1233 of LNCS, pages 239–255. Springer, 1997.
22. J. Goli
´
c. Linear statistical weakness of alleged RC4 keystream generator. In W. Fumy, editor,
Proc. Eurocrypt ’97, volume 1233 of LNCS, pages 226–238. Springer, 1997.
23. J. Goli
´
c and G. Morgari. On the resynchronization attack. In T. Johansson, editor, Proc. Fast
Software Encryption 2003, volume 2887 of LNCS, pages 100–110. Springer, 2003.
24. S. Halevi, D. Coppersmith, and C. Jutla. Scream: A software-efficient stream cipher. In
J. Daemen and V. Rijmen, editors, Proc. Fast Software Encryption 2002, volume 2365 of
LNCS, pages 195–209. Springer, 2002.
25. P. Hawkes and G. Rose. Primitive specification for Sober-128.
http://www.qualcomm.com.au/Sober128.html.
26. P. Hawkes and G. Rose. Primitive specification and supporting documentation for Sober-t32.
NESSIE project submission, October 2000.
27. S. Jiang and G. Gong. Cryptanalysis of stream cipher - a survey. Technical Report CORR-
2002-29, University of Waterloo, 2002.
28. T. Johansson and A. Maximov. A linear distinguishing algorithm on Scream. Presented at
ISIT 2003, available at
http://www.it.lth.se/movax/Publications/2003/Scream/
disting.pdf.
29. Itsik Mantin. Analysis of the stream cipher RC4. Master’s thesis, Weizmann Institute of
Science, Rehovot, Israel, November 2001.
30. D. McGrew and S. Fluhrer. The stream cipher Leviathan. NESSIE project submission,
October 2000.
247