The Welch-Gong stream cipher -- evolutionary path
From MaRDI portal
Publication:6542659
DOI10.1007/s12095-023-00656-0zbMATH Open1547.943MaRDI QIDQ6542659
Kalikinkar Mandal, Guang Gong, Nusa Zidaric, Mark D. Aagaard
Publication date: 22 May 2024
Published in: Cryptography and Communications (Search for Journal in Brave)
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Resilience to distinguishing attacks on WG-7 cipher and their generalizations
- Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\)
- New cyclic difference sets with Singer parameters
- Correlation power analysis and higher-order masking implementation of WAGE
- Gauss sums, Jacobi sums, and \(p\)-ranks of cyclic difference sets
- Rapid hardware design for cryptographic modules with filtering structures over small finite fields
- Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphers
- MILP-based cube attack on the reduced-round WG-5 lightweight stream cipher
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Provable security against a differential attack
- Multiplicative difference sets via additive characters
- Optimal parameters for the WG stream cipher family
- On a generalization of substitution-permutation networks: the HADES design strategy
- On ideal \(t\)-tuple distribution of orthogonal functions in filtering de Bruijn generators
- Aurora: transparent succinct arguments for R1CS
- Cryptanalysis of WG-7: a lightweight stream cipher
- WG: a family of stream ciphers with designed randomness properties
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences
- A Survey of Difference Sets
- GMW sequences (Corresp.)
- Resynchronization Attacks on WG and LEX
- Some New Difference Sets
- Trace representation of Legendre sequences of Mersenne prime period
- Binary pseudorandom sequences of period 2/sup m/-1 with ideal autocorrelation generated by the polynomial z/sup d/+(z+1)/sup d/
- Transform domain analysis of DES
- Efficient Composited de Bruijn Sequence Generators
- Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers
- Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic
- Cryptographic properties of the Welch-Gong transformation sequence generators
- Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations
- Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences
- Fast Discrete Fourier Spectra Attacks on Stream Ciphers
- The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes
- Selected Areas in Cryptography
This page was built for publication: The Welch-Gong stream cipher -- evolutionary path