Algebraic attacks on grain-like keystream generators
From MaRDI portal
Publication:2104441
DOI10.1007/978-3-031-08896-4_12OpenAlexW4286758936MaRDI QIDQ2104441
Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Matthew Beighton
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-08896-4_12
algebraic attacklinear feedback shift registerfast algebraic attackdivide and conquernonlinear feedback shift registergrainfilter generator
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast correlation attacks on nonlinear filter generators
- Fast correlation attacks on certain stream ciphers
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1
- An AEAD variant of the Grain stream cipher
- On Lightweight Stream Ciphers with Shorter Internal States
- Breaking Grain-128 with Dynamic Cube Attacks
- Analysis of Grain’s Initialization Algorithm
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Cryptanalysis of Grain
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Shift-register synthesis and BCH decoding
- SAGE
- Coding and Cryptography
This page was built for publication: Algebraic attacks on grain-like keystream generators