Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
From MaRDI portal
Publication:2434149
DOI10.1007/s10998-012-4631-8zbMath1289.94056OpenAlexW2078050139WikidataQ123130149 ScholiaQ123130149MaRDI QIDQ2434149
Goutam Paul, Sugata Gangopadhyay, Miodrag J. Mihaljević, Hiroshi Imai
Publication date: 17 February 2014
Published in: Periodica Mathematica Hungarica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10998-012-4631-8
Related Items (6)
On the algebraic immunity of multiplexer Boolean functions ⋮ On the normality of \(p\)-ary bent functions ⋮ Constructive Relationships Between Algebraic Thickness and Normality ⋮ Some results on lightweight stream ciphers Fountain v1 \& lizard ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Construction of bent functions from near-bent functions
- Normal Boolean functions
- Finding nonnormal bent functions
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Modeling Block Decoding Approaches for the Fast Correlation Attack
- Cube Attacks on Tweakable Black Box Polynomials
- A cryptanalytic time-memory trade-off
- On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers
This page was built for publication: Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128