Loiss: A Byte-Oriented Stream Cipher
From MaRDI portal
Publication:3005584
DOI10.1007/978-3-642-20901-7_7zbMath1272.94029OpenAlexW98458765MaRDI QIDQ3005584
Dengguo Feng, Chuan-Kun Wu, Xiutao Feng, Wentao Zhang, Xiubin Fan
Publication date: 8 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-20901-7_7
Related Items (11)
Cryptanalysis of the Loiss Stream Cipher ⋮ Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters ⋮ Necessary and sufficient conditions of two classes of permutation polynomials ⋮ Complete permutation polynomials with the form \((x^{p^m} - x + \delta)^s + a x^{p^m} + b x\) over \(\mathbb{F}_{p^n}\) ⋮ A general construction of regular complete permutation polynomials ⋮ Compositions and parities of complete mappings and of orthomorphisms ⋮ Some results on complete permutation polynomials and mutually orthogonal Latin squares ⋮ Permutation polynomials and their differential properties over residue class rings ⋮ Cryptographic properties of cyclic binary matrices ⋮ Constructions of complete permutation polynomials ⋮ Cryptanalysis of Loiss stream cipher -- revisited
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Block substitutions using orthomorphic mappings
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
- A cryptanalytic time-memory trade-off
- Advances in Cryptology - EUROCRYPT 2004
- Improved Time-Memory Trade-Offs with Multiple Data
- New Applications of Time Memory Data Tradeoffs
- The XL-Algorithm and a Conjecture from Commutative Algebra
- Selected Areas in Cryptography
This page was built for publication: Loiss: A Byte-Oriented Stream Cipher