Algebraic attacks on grain-like keystream generators
From MaRDI portal
Publication:2104441
DOI10.1007/978-3-031-08896-4_12OpenAlexW4286758936MaRDI QIDQ2104441
Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Matthew Beighton
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-08896-4_12
algebraic attacklinear feedback shift registerfast algebraic attackdivide and conquernonlinear feedback shift registergrainfilter generator
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast correlation attacks on nonlinear filter generators
- Fast correlation attacks on certain stream ciphers
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1
- An AEAD variant of the Grain stream cipher
- On Lightweight Stream Ciphers with Shorter Internal States
- Breaking Grain-128 with Dynamic Cube Attacks
- Analysis of Grain’s Initialization Algorithm
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Cryptanalysis of Grain
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Shift-register synthesis and BCH decoding
- SAGE
- Coding and Cryptography
This page was built for publication: Algebraic attacks on grain-like keystream generators