eSTREAM
From MaRDI portal
ESTREAM
swMATH12699MaRDI QIDQ24625FDOQ24625
Author name not available (Why is that?)
Official website: http://www.ecrypt.eu.org/stream/
Cited In (only showing first 100 items - show all)
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- TRIAD
- Differential fault based key recovery attacks on TRIAD
- Flatness and structural analysis as a constructive framework for private communication
- New cube distinguishers on NFSR-based stream ciphers
- One word/cycle HC-128 accelerator via state-splitting optimization
- Flaws in the initialisation process of stream ciphers
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- Optimal parameters for the WG stream cipher family
- More permutations and involutions for constructing bent functions
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Cryptanalysis of \texttt{NORX} v2.0
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
- On black-box optimization in divide-and-conquer SAT solving
- Near collision attack on the Grain v1 stream cipher
- New results on the state cycles of Trivium
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
- A novel method for reconstructing period with single input in NFSR
- An Improved Hardware Implementation of the Grain-128a Stream Cipher
- Differential fault analysis of Sosemanuk
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
- Rapid hardware design for cryptographic modules with filtering structures over small finite fields
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Grain-128AEADv2: strengthening the initialization against key reconstruction
- State cycles, initialization and the Trivium stream cipher
- Left invertibility, flatness and identifiability of switched linear dynamical systems: a framework for cryptographic applications
- Hard fault analysis of Trivium
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- New AES Software Speed Records
- Enhanced-bivium algorithm for RFID system
- Nonlinear vectorial primitive recursive sequences
- Correlation attacks on combination generators
- On Galois NFSRs equivalent to Fibonacci ones
- Revamped differential-linear cryptanalysis on reduced round ChaCha
- Designing integrated accelerator for stream ciphers with structural similarities
- Cryptanalysis of the stream cipher LEX
- Design and analysis of small-state grain-like stream ciphers
- Stretching de Bruijn sequences
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- New characterizations and construction methods of bent and hyper-bent Boolean functions
- Hill climbing algorithms and Trivium
- A low-area yet performant FPGA implementation of Shabal
- Differential Fault Attack on Grain v1, ACORN v3 and Lizard
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- On equivalence relations of state diagram of cascade connection of an LFSR into an NFSR
- Loiss: A Byte-Oriented Stream Cipher
- Practical seed-recovery of fast cryptographic pseudo-random number generators
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- FAN
- WAGE
- Parallel scalar multiplication on elliptic curves in wireless sensor networks
- Hardware optimizations of stream cipher Rabbit
- \(d\)-monomial tests of nonlinear cellular automata for cryptographic design
- Properties of the output sequences of a combination generators over finite fields
- Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
- New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
- A heuristic approach towards variability of HC-128
- Analysis of variability and degree of non-linearity of HC-128
- Investigating four neighbourhood cellular automata as better cryptographic primitives
- On the key-stream periods probability of Edon80
- Analysis of Diagonal Constants in Salsa
- Optimized GPU implementation and performance analysis of HC series of stream ciphers
- How to Strengthen Pseudo-random Generators by Using Compression
- Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags
- Cube Attack on Stream Ciphers using a Modified Linearity Test
- Stream/block ciphers, difference equations and algebraic attacks
- Enocoro
- Fruit
- FAN: a lightweight authenticated cryptographic algorithm
- Secure and computationally efficient cryptographic primitive based on cellular automaton
- Fault analysis of grain-128 by targeting NFSR
- An efficient state recovery attack on the X-FCSR family of stream ciphers
- Breaking the F-FCSR-H Stream Cipher in Real Time
- Conditional differential cryptanalysis of 105 round Grain v1
- Walsh transforms and cryptographic applications in bias computing
- Characteristic set algorithms for equation solving in finite fields
- Analysis of the generalized self-shrinking generator
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- Attacking Bivium and Trivium with the characteristic set method
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Improved results on periodic multisequences with large error linear complexity
- ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
- Attacking Bivium Using SAT Solvers
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- QUAD: A multivariate stream cipher with provable security
- WG: a family of stream ciphers with designed randomness properties
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Greedy distinguishers and nonrandomness detectors
- Rotational rebound attacks on reduced Skein
- PolyBoRi
- slimgb
- Scream
- HAVAL
- X-FCSR
This page was built for software: eSTREAM