Two Trivial Attacks on Trivium
From MaRDI portal
Publication:5452245
DOI10.1007/978-3-540-77360-3_3zbMath1154.94418OpenAlexW1565672394MaRDI QIDQ5452245
Alex Biryukov, Alexander Maksimov
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.3923
Related Items (20)
Stream/block ciphers, difference equations and algebraic attacks ⋮ Conditional Differential Cryptanalysis of Trivium and KATAN ⋮ State cycles, initialization and the Trivium stream cipher ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Enhanced-bivium algorithm for RFID system ⋮ On black-box optimization in divide-and-conquer SAT solving ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Attacking Bivium Using SAT Solvers ⋮ Optimising Gröbner bases on Bivium ⋮ Differential Fault Analysis of Trivium ⋮ Fault analysis of Trivium ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Attacking Bivium and Trivium with the Characteristic Set Method ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ Extended BDD-Based Cryptanalysis of Keystream Generators ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Hill Climbing Algorithms and Trivium ⋮ Slid Pairs in Salsa20 and Trivium ⋮ Floating Fault Analysis of Trivium ⋮ A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters
Cites Work
This page was built for publication: Two Trivial Attacks on Trivium