An improved degree evaluation method of NFSR-based cryptosystems
From MaRDI portal
Publication:2243894
DOI10.1007/s10623-021-00954-9zbMath1477.94064OpenAlexW3209417476MaRDI QIDQ2243894
Publication date: 11 November 2021
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00954-9
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast correlation attacks on certain stream ciphers
- Correlation cube attacks: from weak-key distinguisher to key recovery
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- Degree evaluation of NFSR-based cryptosystems
- Cube attacks on non-blackbox polynomials based on division property
- TriviA: a fast and secure authenticated encryption scheme
- A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers
- New cube distinguishers on NFSR-based stream ciphers
- Quark: a lightweight hash
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Breaking Grain-128 with Dynamic Cube Attacks
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
- Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Cube Attacks on Non-Blackbox Polynomials Based on Division Property
- Higher Order Differential Attack of a CAST Cipher
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: An improved degree evaluation method of NFSR-based cryptosystems