New stream cipher designs. The eSTREAM finalists

From MaRDI portal
Publication:929893

DOI10.1007/978-3-540-68351-3zbMath1259.94006OpenAlexW2495326574MaRDI QIDQ929893

No author found.

Publication date: 19 June 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-68351-3




Related Items (40)

Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generatorFAN: a lightweight authenticated cryptographic algorithmCASca:A CA Based Scalable Stream CipherOn black-box optimization in divide-and-conquer SAT solvingThe cycle structure of \(\mathrm{NFSR}(f^d)\) and its applicationsOn a class of isomorphic NFSRsOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesALE: AES-Based Lightweight Authenticated EncryptionAttacking Bivium Using SAT SolversLatin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of ForróDesign Strategies for ARX with Provable Bounds: Sparx and LAXLatin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of ForróOptimising Gröbner bases on BiviumKrip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift registerKeymill: side-channel resilient key generator, a new concept for SCA-security by designSecurity analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\)On the largest affine sub-families of a family of NFSR sequencesAn interleaved method for constructing de Bruijn sequencesOn Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSRFinding Effective SAT Partitionings Via Black-Box OptimizationA NEW STREAM CIPHER BASED ON FIALKA M-125Espresso: a stream cipher for 5G wireless communication systemsFast Correlation Attacks: Methods and CountermeasuresThe Additive Differential Probability of ARXOn affine sub-families of Grain-like structuresInvestigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRsConstructions of de Bruijn sequences from a full-length shift register and an irreducible LFSRAn observation on NORX, BLAKE2, and ChaChaInternal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attackA new result on irreducible NFSRs with respect to cascade connectionFurther results on the equivalence between Galois NFSRs and Fibonacci NFSRsPeriod distribution of generalized discrete Arnold cat mapA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANImproved linear approximations to ARX ciphers and attacks against ChaChaConstructing de Bruijn Sequences Based on a New Necessary ConditionWhen lagged Fibonacci generators jumpOn the uniqueness of a type of cascade connection representations for NFSRsCryptanalysis of Loiss stream cipher -- revisitedOn affine sub-families of the NFSR in grainA generic method for investigating nonsingular Galois NFSRs




This page was built for publication: New stream cipher designs. The eSTREAM finalists