Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
eSTREAM - MaRDI portal

eSTREAM

From MaRDI portal
Software:24625



swMATH12699MaRDI QIDQ24625


No author found.





Related Items (only showing first 100 items - show all)

More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)Slid Pairs in Salsa20 and TriviumNew Directions in Cryptanalysis of Self-Synchronizing Stream CiphersAnalysis of RC4 and Proposal of Additional Layers for Better Security MarginScan Based Side Channel Attacks on Stream Ciphers and Their Counter-MeasuresFloating Fault Analysis of TriviumNew AES Software Speed RecordsChai-Tea, Cryptographic Hardware Implementations of xTEAParallel Scalar Multiplication on Elliptic Curves in Wireless Sensor NetworksMore permutations and involutions for constructing bent functionsConditional differential cryptanalysis of 105 round Grain v1Stream/block ciphers, difference equations and algebraic attacksAnalysis of variability and degree of non-linearity of HC-128Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generatorWalsh transforms and cryptographic applications in bias computingFAN: a lightweight authenticated cryptographic algorithmChosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}Differential fault based key recovery attacks on TRIADCASca:A CA Based Scalable Stream CipherCorrelation attacks on combination generatorsOn the nonlinearity of maximum-length NFSR feedbacksState cycles, initialization and the Trivium stream cipherA novel method for reconstructing period with single input in NFSROn the Key-Stream Periods Probability of Edon80Analysis of Diagonal Constants in SalsaDifferential Fault Attack on Grain v1, ACORN v3 and LizardGrain-128AEADv2: strengthening the initialization against key reconstructionCube Attack on Stream Ciphers using a Modified Linearity TestInvestigating four neighbourhood cellular automata as better cryptographic primitivesDesigning integrated accelerator for stream ciphers with structural similaritiesEnhanced-bivium algorithm for RFID systemRevamped differential-linear cryptanalysis on reduced round ChaChaNonlinear vectorial primitive recursive sequencesA new multi-linear universal hash familyMaD2: An Ultra-Performance Stream Cipher for Pervasive Data EncryptionOn black-box optimization in divide-and-conquer SAT solvingStretching de Bruijn sequencesImproved results on periodic multisequences with large error linear complexityOne Word/Cycle HC-128 Accelerator via State-Splitting OptimizationStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionNear Collision Attack on the Grain v1 Stream CipherConstruction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphersFurther non-randomness in RC4, RC4A and VMPCAttacking Bivium Using SAT SolversCharacteristic set algorithms for equation solving in finite fieldsOptimising Gröbner bases on BiviumNew characterizations and construction methods of bent and hyper-bent Boolean functionsGeneric cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128Cryptanalysis of the stream cipher LEXOn the efficiency of solving Boolean polynomial systems with the characteristic set methodBreaking the stream ciphers F-FCSR-H and F-FCSR-16 in real timeAn efficient state recovery attack on the X-FCSR family of stream ciphersELmD: A Pipelineable Authenticated Encryption and Its Hardware ImplementationOn Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSRRapid hardware design for cryptographic modules with filtering structures over small finite fieldsFlatness and structural analysis as a constructive framework for private communicationFault analysis of TriviumLeft invertibility, flatness and identifiability of switched linear dynamical systems: a framework for cryptographic applicationsA generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequencesLoiss: A Byte-Oriented Stream CipherStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionEspresso: a stream cipher for 5G wireless communication systemsAttacking Bivium and Trivium with the Characteristic Set MethodFault Analysis of Grain-128 by Targeting NFSRDifferential Fault Analysis of SosemanukObserving biases in the state: case studies with Trivium and Trivia-SCDesign and analysis of small-state grain-like stream ciphersOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksPRINCE – A Low-Latency Block Cipher for Pervasive Computing ApplicationsProbabilistic signature based generalized framework for differential fault analysis of stream ciphersSecure and Computationally Efficient Cryptographic Primitive Based on Cellular AutomatonWG: a family of stream ciphers with designed randomness propertiesNew results on the state cycles of TriviumTreatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphersAn Improved Hardware Implementation of the Grain-128a Stream CipherOptimized GPU Implementation and Performance Analysis of HC Series of Stream CiphersNew Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUsCryptanalysis of \texttt{NORX} v2.0Analysis of the generalized self-shrinking generatord-Monomial Tests of Nonlinear Cellular Automata for Cryptographic DesignOptimal parameters for the WG stream cipher familyModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorQUAD: A Practical Stream Cipher with Provable SecurityHow to Strengthen Pseudo-random Generators by Using CompressionEfficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic AttacksBreaking the F-FCSR-H Stream Cipher in Real TimeDistinguishing attacks on stream ciphers based on arrays of pseudo-random wordsFlaws in the Initialisation Process of Stream CiphersGreedy Distinguishers and Nonrandomness DetectorsHard fault analysis of TriviumNew cube distinguishers on NFSR-based stream ciphersQUAD: A multivariate stream cipher with provable securityCryptographic properties of nonlinear pseudorandom number generatorsEfficient RFID authentication protocols based on pseudorandom sequence generatorsRotational rebound attacks on reduced SkeinCube Attacks on Tweakable Black Box PolynomialsСвойства последовательностей, вырабатываемых комбинирующими генераторами над конечными полямиHill Climbing Algorithms and TriviumA Low-Area Yet Performant FPGA Implementation of ShabalImplementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags


This page was built for software: eSTREAM