eSTREAM
From MaRDI portal
Software:24625
No author found.
Related Items (only showing first 100 items - show all)
More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\) ⋮ Slid Pairs in Salsa20 and Trivium ⋮ New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures ⋮ Floating Fault Analysis of Trivium ⋮ New AES Software Speed Records ⋮ Chai-Tea, Cryptographic Hardware Implementations of xTEA ⋮ Parallel Scalar Multiplication on Elliptic Curves in Wireless Sensor Networks ⋮ More permutations and involutions for constructing bent functions ⋮ Conditional differential cryptanalysis of 105 round Grain v1 ⋮ Stream/block ciphers, difference equations and algebraic attacks ⋮ Analysis of variability and degree of non-linearity of HC-128 ⋮ Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator ⋮ Walsh transforms and cryptographic applications in bias computing ⋮ FAN: a lightweight authenticated cryptographic algorithm ⋮ Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa} ⋮ Differential fault based key recovery attacks on TRIAD ⋮ CASca:A CA Based Scalable Stream Cipher ⋮ Correlation attacks on combination generators ⋮ On the nonlinearity of maximum-length NFSR feedbacks ⋮ State cycles, initialization and the Trivium stream cipher ⋮ A novel method for reconstructing period with single input in NFSR ⋮ On the Key-Stream Periods Probability of Edon80 ⋮ Analysis of Diagonal Constants in Salsa ⋮ Differential Fault Attack on Grain v1, ACORN v3 and Lizard ⋮ Grain-128AEADv2: strengthening the initialization against key reconstruction ⋮ Cube Attack on Stream Ciphers using a Modified Linearity Test ⋮ Investigating four neighbourhood cellular automata as better cryptographic primitives ⋮ Designing integrated accelerator for stream ciphers with structural similarities ⋮ Enhanced-bivium algorithm for RFID system ⋮ Revamped differential-linear cryptanalysis on reduced round ChaCha ⋮ Nonlinear vectorial primitive recursive sequences ⋮ A new multi-linear universal hash family ⋮ MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption ⋮ On black-box optimization in divide-and-conquer SAT solving ⋮ Stretching de Bruijn sequences ⋮ Improved results on periodic multisequences with large error linear complexity ⋮ One Word/Cycle HC-128 Accelerator via State-Splitting Optimization ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers ⋮ Further non-randomness in RC4, RC4A and VMPC ⋮ Attacking Bivium Using SAT Solvers ⋮ Characteristic set algorithms for equation solving in finite fields ⋮ Optimising Gröbner bases on Bivium ⋮ New characterizations and construction methods of bent and hyper-bent Boolean functions ⋮ Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 ⋮ Cryptanalysis of the stream cipher LEX ⋮ On the efficiency of solving Boolean polynomial systems with the characteristic set method ⋮ Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time ⋮ An efficient state recovery attack on the X-FCSR family of stream ciphers ⋮ ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation ⋮ On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR ⋮ Rapid hardware design for cryptographic modules with filtering structures over small finite fields ⋮ Flatness and structural analysis as a constructive framework for private communication ⋮ Fault analysis of Trivium ⋮ Left invertibility, flatness and identifiability of switched linear dynamical systems: a framework for cryptographic applications ⋮ A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences ⋮ Loiss: A Byte-Oriented Stream Cipher ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Attacking Bivium and Trivium with the Characteristic Set Method ⋮ Fault Analysis of Grain-128 by Targeting NFSR ⋮ Differential Fault Analysis of Sosemanuk ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ Design and analysis of small-state grain-like stream ciphers ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications ⋮ Probabilistic signature based generalized framework for differential fault analysis of stream ciphers ⋮ Secure and Computationally Efficient Cryptographic Primitive Based on Cellular Automaton ⋮ WG: a family of stream ciphers with designed randomness properties ⋮ New results on the state cycles of Trivium ⋮ Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers ⋮ An Improved Hardware Implementation of the Grain-128a Stream Cipher ⋮ Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers ⋮ New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs ⋮ Cryptanalysis of \texttt{NORX} v2.0 ⋮ Analysis of the generalized self-shrinking generator ⋮ d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design ⋮ Optimal parameters for the WG stream cipher family ⋮ Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector ⋮ QUAD: A Practical Stream Cipher with Provable Security ⋮ How to Strengthen Pseudo-random Generators by Using Compression ⋮ Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks ⋮ Breaking the F-FCSR-H Stream Cipher in Real Time ⋮ Distinguishing attacks on stream ciphers based on arrays of pseudo-random words ⋮ Flaws in the Initialisation Process of Stream Ciphers ⋮ Greedy Distinguishers and Nonrandomness Detectors ⋮ Hard fault analysis of Trivium ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ QUAD: A multivariate stream cipher with provable security ⋮ Cryptographic properties of nonlinear pseudorandom number generators ⋮ Efficient RFID authentication protocols based on pseudorandom sequence generators ⋮ Rotational rebound attacks on reduced Skein ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Свойства последовательностей, вырабатываемых комбинирующими генераторами над конечными полями ⋮ Hill Climbing Algorithms and Trivium ⋮ A Low-Area Yet Performant FPGA Implementation of Shabal ⋮ Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags
This page was built for software: eSTREAM