Analysis of Grain’s Initialization Algorithm
From MaRDI portal
Publication:3506388
DOI10.1007/978-3-540-68164-9_19zbMath1142.94340OpenAlexW2147227205MaRDI QIDQ3506388
Özgül Küçük, Christophe De Cannière, Bart Preneel
Publication date: 13 June 2008
Published in: Progress in Cryptology – AFRICACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68164-9_19
Related Items (11)
Conditional differential cryptanalysis of 105 round Grain v1 ⋮ High order differential attacks on stream ciphers ⋮ Quark: a lightweight hash ⋮ Fast near collision attack on the Grain v1 stream cipher ⋮ Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ A new distinguishing attack on Grain-V1 with 111 initialization rounds ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ Flaws in the Initialisation Process of Stream Ciphers ⋮ Algebraic attacks on grain-like keystream generators
Cites Work
This page was built for publication: Analysis of Grain’s Initialization Algorithm