Near Collision Attack on the Grain v1 Stream Cipher
From MaRDI portal
Publication:2946894
DOI10.1007/978-3-662-43933-3_27zbMath1321.94097OpenAlexW1477955099MaRDI QIDQ2946894
Dengguo Feng, Bin Zhang, Dong-Dai Lin, Zhen-Qi Li
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_27
Related Items
Grain-like structures with minimal and maximal period sequences ⋮ Fast near collision attack on the Grain v1 stream cipher ⋮ A new distinguishing attack on Grain-V1 with 111 initialization rounds
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings
- Gaussian elimination is not optimal
- Statistical Tools Flavor Side-Channel Collision Attacks
- Breaking Grain-128 with Dynamic Cube Attacks
- Greedy Distinguishers and Nonrandomness Detectors
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
- Analysis of Grain’s Initialization Algorithm
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Weak Pseudorandom Functions in Minicrypt
- Correlation-Enhanced Power Analysis Collision Attack
- Provably Secure Higher-Order Masking of AES
- Composition Implies Adaptive Security in Minicrypt
- Cryptanalysis of Grain
- A Leakage-Resilient Mode of Operation
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Theory of Cryptography