Algebraic attacks on grain-like keystream generators
From MaRDI portal
Publication:2104441
DOI10.1007/978-3-031-08896-4_12OpenAlexW4286758936MaRDI QIDQ2104441FDOQ2104441
Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Matthew Beighton
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-08896-4_12
algebraic attacklinear feedback shift registerfast algebraic attackdivide and conquernonlinear feedback shift registergrainfilter generator
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- Fast correlation attacks on certain stream ciphers
- Breaking Grain-128 with Dynamic Cube Attacks
- Analysis of Grain’s Initialization Algorithm
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Cryptanalysis of Grain
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Shift-register synthesis and BCH decoding
- Fast correlation attacks on nonlinear filter generators
- Selected Areas in Cryptography
- SAGE
- Coding and Cryptography
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1
- An AEAD variant of the Grain stream cipher
- On Lightweight Stream Ciphers with Shorter Internal States
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
Cited In (4)
Uses Software
This page was built for publication: Algebraic attacks on grain-like keystream generators
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2104441)