Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles - MaRDI portal

Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles

From MaRDI portal
Publication:3506887

DOI10.1007/11836810_13zbMath1156.94345OpenAlexW1561363170MaRDI QIDQ3506887

Christophe De Cannière

Publication date: 17 June 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-850.pdf




Related Items (30)

Stream/block ciphers, difference equations and algebraic attacksCombined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipherConditional Differential Cryptanalysis of Trivium and KATANImproved transformation algorithms for generalized Galois NLFSRsDifferential fault based key recovery attacks on TRIADA survey on implementation of lightweight block ciphers for resource constraints devicesCASca:A CA Based Scalable Stream CipherHigh order differential attacks on stream ciphersCryptanalysis of a Chaotic Stream Cipher and Its Improved SchemeCryptanalysis of Full SproutComparison of Cube Attacks Over Different Vector SpacesGrain-128AEADv2: strengthening the initialization against key reconstructionCube Attack on Stream Ciphers using a Modified Linearity TestAnalyzing Boolean functions via solving parametric polynomial systemsRemote IP Protection Using Timing ChannelsImproving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube AttacksChosen IV Statistical Analysis for Key Recovery Attacks on Stream CiphersSpeeding up the GVW algorithm via a substituting methodBreaking Grain-128 with Dynamic Cube AttackssLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitivesUpper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexityProbabilistic signature based generalized framework for differential fault analysis of stream ciphersSearch heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealingUnnamed ItemCube Attacks on Tweakable Black Box PolynomialsA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesNumerical solvers and cryptanalysisNew general framework for algebraic degree evaluation of NFSR-based cryptosystemsA Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters


Uses Software



This page was built for publication: Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles