QUAD: A Practical Stream Cipher with Provable Security
From MaRDI portal
Publication:3593092
DOI10.1007/11761679_8zbMath1140.94322OpenAlexW1495150777MaRDI QIDQ3593092
Côme Berbain, Jacques Patarin, Henri Gilbert
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_8
Related Items (15)
Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU ⋮ More efficient DDH pseudorandom generators ⋮ Cryptanalysis of the TRMS Signature Scheme of PKC’05 ⋮ SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags ⋮ Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds ⋮ Syndrome Based Collision Resistant Hashing ⋮ Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ ⋮ Analysis of Multivariate Hash Functions ⋮ A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers ⋮ QUAD: A multivariate stream cipher with provable security ⋮ Hybrid MQ Signature for Embedded Device ⋮ Building Secure Block Ciphers on Generic Attacks Assumptions ⋮ General Fault Attacks on Multivariate Public Key Cryptosystems ⋮ An overview of distinguishing attacks on stream ciphers ⋮ Fuzzy matching template attacks on multivariate cryptography: a case study
Uses Software
Cites Work
- Complexity of solving algebraic equations
- Efficient cryptographic schemes provably as secure as subset sum
- Three XOR-Lemmas — An Exposition
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- A Simple Unpredictable Pseudo-Random Number Generator
- A Pseudorandom Generator from any One-way Function
- Foundations of Cryptography
- The XL-Algorithm and a Conjecture from Commutative Algebra
- Comparison Between XL and Gröbner Basis Algorithms
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: QUAD: A Practical Stream Cipher with Provable Security