On the Security of IV Dependent Stream Ciphers
From MaRDI portal
Publication:3524895
DOI10.1007/978-3-540-74619-5_17zbMath1186.94423OpenAlexW1599058895MaRDI QIDQ3524895
Publication date: 16 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74619-5_17
Related Items (10)
Variants of Wegman-Carter message authentication code supporting variable tag lengths ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Tweakable enciphering schemes using only the encryption function of a block cipher ⋮ Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector ⋮ A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers ⋮ QUAD: A multivariate stream cipher with provable security ⋮ X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs
This page was built for publication: On the Security of IV Dependent Stream Ciphers