New stream cipher designs. The eSTREAM finalists
From MaRDI portal
Recommendations
Cited in
(67)- A New Ultrafast Stream Cipher Design: COS Ciphers
- FAN: a lightweight authenticated cryptographic algorithm
- ALE: AES-based lightweight authenticated encryption
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- A new stream cipher based on Fialka M-125
- Hardware framework for the rabbit stream cipher
- A generic method for investigating nonsingular Galois NFSRs
- An improved method for evaluating secret variables and its application to WAGE
- Cryptanalysis of Loiss stream cipher -- revisited
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs
- Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR
- Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\)
- Stream ciphers, a perspective. (Abstract)
- Attacking Bivium Using SAT Solvers
- Krip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift register
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
- On black-box optimization in divide-and-conquer SAT solving
- On affine sub-families of the NFSR in grain
- GL-S-NFSR: a new NFSR structure and its period properties
- Theoretical differential fault attacks on FLIP and FiLIP
- Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRs
- Turing: a fast stream cipher.
- Finding Effective SAT Partitionings Via Black-Box Optimization
- Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró
- Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró
- On the largest affine sub-families of a family of NFSR sequences
- Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
- A new method for searching cubes and its application to 815-round trivium
- A Fibonacci view on the Galois NFSR used in Trivium
- scientific article; zbMATH DE number 2085438 (Why is no real title available?)
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- A new result on irreducible NFSRs with respect to cascade connection
- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software
- On a class of isomorphic NFSRs
- scientific article; zbMATH DE number 2089137 (Why is no real title available?)
- scientific article; zbMATH DE number 2089312 (Why is no real title available?)
- Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
- Constructing de Bruijn sequences based on a new necessary condition
- A heuristic approach towards variability of HC-128
- Improved linear approximations to ARX ciphers and attacks against ChaCha
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- Insights gained after a decade of cellular automata-based cryptography
- The Design of a Stream Cipher LEX
- Stream Ciphers: Dead or Alive?
- Dragon: A Fast Word Based Stream Cipher
- The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications
- Fast Software Encryption
- Gemstone: A new stream cipher using coupled map lattice
- Fast Correlation Attacks: Methods and Countermeasures
- On the uniqueness of a type of cascade connection representations for NFSRs
- Period distribution of generalized discrete Arnold cat map
- Optimising Gröbner bases on Bivium
- Espresso: a stream cipher for 5G wireless communication systems
- The Additive Differential Probability of ARX
- Keymill: side-channel resilient key generator, a new concept for SCA-security by design
- On weak keys and forgery attacks against polynomial-based MAC schemes
- On affine sub-families of Grain-like structures
- Near collision attack against Grain v1
- Cryptography and Coding
- A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher
- Further results on affine sub-families of NFSR sequences
- When lagged Fibonacci generators jump
- CASca: a CA based scalable stream cipher
- An observation on NORX, BLAKE2, and ChaCha
- On equivalence relations of state diagram of cascade connection of an LFSR into an NFSR
- An interleaved method for constructing de Bruijn sequences
This page was built for publication: New stream cipher designs. The eSTREAM finalists
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q929893)