Algebraic attacks on grain-like keystream generators
From MaRDI portal
Publication:2104441
Cites work
- scientific article; zbMATH DE number 1950612 (Why is no real title available?)
- scientific article; zbMATH DE number 2009966 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- An AEAD variant of the Grain stream cipher
- Analysis of Grain’s Initialization Algorithm
- Breaking Grain-128 with dynamic cube attacks
- Coding and Cryptography
- Cryptanalysis of Grain
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1
- Fast correlation attacks on certain stream ciphers
- Fast correlation attacks on nonlinear filter generators
- On lightweight stream ciphers with shorter internal states
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- SAGE
- Selected Areas in Cryptography
- Shift-register synthesis and BCH decoding
Cited in
(4)
This page was built for publication: Algebraic attacks on grain-like keystream generators
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2104441)