New stream cipher designs. The eSTREAM finalists
From MaRDI portal
Publication:929893
DOI10.1007/978-3-540-68351-3zbMath1259.94006OpenAlexW2495326574MaRDI QIDQ929893
No author found.
Publication date: 19 June 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68351-3
Cryptography (94A60) Collections of articles of miscellaneous specific interest (00B15) Data encryption (aspects in computer science) (68P25) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Related Items (40)
Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator ⋮ FAN: a lightweight authenticated cryptographic algorithm ⋮ CASca:A CA Based Scalable Stream Cipher ⋮ On black-box optimization in divide-and-conquer SAT solving ⋮ The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications ⋮ On a class of isomorphic NFSRs ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ ALE: AES-Based Lightweight Authenticated Encryption ⋮ Attacking Bivium Using SAT Solvers ⋮ Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró ⋮ Optimising Gröbner bases on Bivium ⋮ Krip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift register ⋮ Keymill: side-channel resilient key generator, a new concept for SCA-security by design ⋮ Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\) ⋮ On the largest affine sub-families of a family of NFSR sequences ⋮ An interleaved method for constructing de Bruijn sequences ⋮ On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR ⋮ Finding Effective SAT Partitionings Via Black-Box Optimization ⋮ A NEW STREAM CIPHER BASED ON FIALKA M-125 ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Fast Correlation Attacks: Methods and Countermeasures ⋮ The Additive Differential Probability of ARX ⋮ On affine sub-families of Grain-like structures ⋮ Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRs ⋮ Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack ⋮ A new result on irreducible NFSRs with respect to cascade connection ⋮ Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs ⋮ Period distribution of generalized discrete Arnold cat map ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ Improved linear approximations to ARX ciphers and attacks against ChaCha ⋮ Constructing de Bruijn Sequences Based on a New Necessary Condition ⋮ When lagged Fibonacci generators jump ⋮ On the uniqueness of a type of cascade connection representations for NFSRs ⋮ Cryptanalysis of Loiss stream cipher -- revisited ⋮ On affine sub-families of the NFSR in grain ⋮ A generic method for investigating nonsingular Galois NFSRs
This page was built for publication: New stream cipher designs. The eSTREAM finalists