eSTREAM
From MaRDI portal
ESTREAM
Cited in
(only showing first 100 items - show all)- QUAD: A Practical Stream Cipher with Provable Security
- Stream/block ciphers, difference equations and algebraic attacks
- FAN: a lightweight authenticated cryptographic algorithm
- Cube Attack on Stream Ciphers using a Modified Linearity Test
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- Secure and computationally efficient cryptographic primitive based on cellular automaton
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Parallel scalar multiplication on elliptic curves in wireless sensor networks
- Differential fault based key recovery attacks on TRIAD
- An efficient state recovery attack on the X-FCSR family of stream ciphers
- Fault analysis of grain-128 by targeting NFSR
- Hardware optimizations of stream cipher Rabbit
- Breaking the F-FCSR-H Stream Cipher in Real Time
- Flatness and structural analysis as a constructive framework for private communication
- New cube distinguishers on NFSR-based stream ciphers
- Conditional differential cryptanalysis of 105 round Grain v1
- Walsh transforms and cryptographic applications in bias computing
- One word/cycle HC-128 accelerator via state-splitting optimization
- Characteristic set algorithms for equation solving in finite fields
- Flaws in the initialisation process of stream ciphers
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- Optimal parameters for the WG stream cipher family
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- Analysis of the generalized self-shrinking generator
- More permutations and involutions for constructing bent functions
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Improved results on periodic multisequences with large error linear complexity
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Attacking Bivium and Trivium with the characteristic set method
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Cryptanalysis of \texttt{NORX} v2.0
- ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
- Attacking Bivium Using SAT Solvers
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
- On black-box optimization in divide-and-conquer SAT solving
- \(d\)-monomial tests of nonlinear cellular automata for cryptographic design
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- New results on the state cycles of Trivium
- Near collision attack on the Grain v1 stream cipher
- QUAD: A multivariate stream cipher with provable security
- A novel method for reconstructing period with single input in NFSR
- An Improved Hardware Implementation of the Grain-128a Stream Cipher
- Differential fault analysis of Sosemanuk
- WG: a family of stream ciphers with designed randomness properties
- Properties of the output sequences of a combination generators over finite fields
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
- Rapid hardware design for cryptographic modules with filtering structures over small finite fields
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Grain-128AEADv2: strengthening the initialization against key reconstruction
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- State cycles, initialization and the Trivium stream cipher
- Greedy distinguishers and nonrandomness detectors
- Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
- Left invertibility, flatness and identifiability of switched linear dynamical systems: a framework for cryptographic applications
- PolyBoRi
- slimgb
- Scream
- HAVAL
- X-FCSR
- Salsa20
- Trivium
- ChaCha
- Rumba20
- Rabbit
- Diehard
- CAR30
- TestU01
- TinyECC
- eBACS
- MICKEY
- CryptoMiniSat
- SOSEMANUK
- NanGate
- CASca
- CASTREAM
- Rotational rebound attacks on reduced Skein
- Espresso
- Grain
- MaD2
- LEX
- QUAD
- SNOW
- SHIELD
- NIST Statistical Test Suite
- MMH
- Poly1305-AES
- tuftests
- estreambench
- Edon80
- XTEA
- CAG
- Hard fault analysis of Trivium
- New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- Enhanced-bivium algorithm for RFID system
This page was built for software: eSTREAM