Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
From MaRDI portal
Publication:3506887
DOI10.1007/11836810_13zbMath1156.94345OpenAlexW1561363170MaRDI QIDQ3506887
Publication date: 17 June 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-850.pdf
Related Items (30)
Stream/block ciphers, difference equations and algebraic attacks ⋮ Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher ⋮ Conditional Differential Cryptanalysis of Trivium and KATAN ⋮ Improved transformation algorithms for generalized Galois NLFSRs ⋮ Differential fault based key recovery attacks on TRIAD ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ CASca:A CA Based Scalable Stream Cipher ⋮ High order differential attacks on stream ciphers ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ Cryptanalysis of Full Sprout ⋮ Comparison of Cube Attacks Over Different Vector Spaces ⋮ Grain-128AEADv2: strengthening the initialization against key reconstruction ⋮ Cube Attack on Stream Ciphers using a Modified Linearity Test ⋮ Analyzing Boolean functions via solving parametric polynomial systems ⋮ Remote IP Protection Using Timing Channels ⋮ Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks ⋮ Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers ⋮ Speeding up the GVW algorithm via a substituting method ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives ⋮ Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity ⋮ Probabilistic signature based generalized framework for differential fault analysis of stream ciphers ⋮ Search heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealing ⋮ Unnamed Item ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ Numerical solvers and cryptanalysis ⋮ New general framework for algebraic degree evaluation of NFSR-based cryptosystems ⋮ A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters
Uses Software
This page was built for publication: Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles