Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles

From MaRDI portal
Publication:3506887


DOI10.1007/11836810_13zbMath1156.94345MaRDI QIDQ3506887

Christophe De Cannière

Publication date: 17 June 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-850.pdf


94A60: Cryptography


Related Items

Unnamed Item, A survey on implementation of lightweight block ciphers for resource constraints devices, Cube Attack on Stream Ciphers using a Modified Linearity Test, A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters, Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity, Probabilistic signature based generalized framework for differential fault analysis of stream ciphers, Stream/block ciphers, difference equations and algebraic attacks, Differential fault based key recovery attacks on TRIAD, Speeding up the GVW algorithm via a substituting method, sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives, Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles, New general framework for algebraic degree evaluation of NFSR-based cryptosystems, Improved transformation algorithms for generalized Galois NLFSRs, Grain-128AEADv2: strengthening the initialization against key reconstruction, High order differential attacks on stream ciphers, Search heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealing, Analyzing Boolean functions via solving parametric polynomial systems, Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher, Conditional Differential Cryptanalysis of Trivium and KATAN, Remote IP Protection Using Timing Channels, Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks, Breaking Grain-128 with Dynamic Cube Attacks, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme, Numerical solvers and cryptanalysis, CASca:A CA Based Scalable Stream Cipher, Cryptanalysis of Full Sprout, Comparison of Cube Attacks Over Different Vector Spaces, Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers, Cube Attacks on Tweakable Black Box Polynomials


Uses Software