Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 (Q2434149): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(8 intermediate revisions by 6 users not shown)
Property / reviewed by
 
Property / reviewed by: Q189407 / rank
Normal rank
 
Property / Wikidata QID
 
Property / Wikidata QID: Q123130149 / rank
 
Normal rank
Property / reviewed by
 
Property / reviewed by: Richard A. Mollin / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: eSTREAM / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Grain / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10998-012-4631-8 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2078050139 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707396 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537979 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035709 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding nonnormal bent functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Normal Boolean functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cube Attacks on Tweakable Black Box Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484882 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling Block Decoding Approaches for the Fast Correlation Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: A cryptanalytic time-memory trade-off / rank
 
Normal rank
Property / cites work
 
Property / cites work: Construction of bent functions from near-bent functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3597524 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536822 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 08:15, 7 July 2024

scientific article
Language Label Description Also known as
English
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
scientific article

    Statements

    Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    17 February 2014
    0 references
    The authors have, as a specific objective, the security evaluation of stream cipher Grain-128. They do this once they have introduced a generic algorithm for cryptanalysis of certain stream ciphers based on a security weakness of \(k\)-normal Boolean functions. This algorithm also points to design guidelines for avoiding certain certain weak stream cipher constructions. The proposed methodology for cryptanalysis mainly depends upon the order of normality of Boolean functions used in Grain-128. Their results, therefore, point to data for the cryptographic significance of the normality criteria of Boolean functions
    0 references
    stream cipher
    0 references
    cryptanalysis
    0 references
    \(k\)-normal Boolean functions
    0 references
    time-memory-data trade-off
    0 references
    Grain-128
    0 references
    0 references
    0 references

    Identifiers