Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
From MaRDI portal
Publication:2807196
DOI10.1007/978-3-319-31301-6_4zbMath1396.94074OpenAlexW2397074368MaRDI QIDQ2807196
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_4
stream cipherdivide-and-conquerLFSRNLFSRkeystream generatorguess-and-determineSprouttime memory data tradeoff attacks
Related Items (5)
FAN: a lightweight authenticated cryptographic algorithm ⋮ Some results on lightweight stream ciphers Fountain v1 \& lizard ⋮ Some results on Fruit ⋮ Design and analysis of small-state grain-like stream ciphers ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- ITUbee: A Software Oriented Lightweight Block Cipher
- On Lightweight Stream Ciphers with Shorter Internal States
- LBlock: A Lightweight Block Cipher
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Cryptanalysis of Full Sprout
- PRESENT: An Ultra-Lightweight Block Cipher
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- A cryptanalytic time-memory trade-off
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
This page was built for publication: Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks