Trivium

From MaRDI portal
Publication:3510915

DOI10.1007/978-3-540-68351-3_18zbMath1285.94054OpenAlexW4234875403MaRDI QIDQ3510915

Christophe De Cannière, Bart Preneel

Publication date: 3 July 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-68351-3_18




Related Items (41)

Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystemsGrain-like structures with minimal and maximal period sequencesQuark: a lightweight hashLHash: A Lightweight Hash FunctionIsomorphism and equivalence of Galois nonlinear feedback shift registersCorrelation cube attacks: from weak-key distinguisher to key recoveryA necessary and sufficient condition for a class of nonsingular Galois NFSRsThe cycle structure of \(\mathrm{NFSR}(f^d)\) and its applicationsA new upper bound on the order of affine sub-families of NFSRsAn Equivalence-Preserving Transformation of Shift RegistersImproved Multi-Bit Differential Fault Analysis of TriviumOn a class of isomorphic NFSRsStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionALE: AES-Based Lightweight Authenticated EncryptionImproved graph-based model for recovering superpoly on TriviumCryptanalysis of reduced round SPEEDYConditional Cube Searching and Applications on Trivium-Variant CiphersMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityHigher-order masking scheme for Trivium hardware implementationA practical key-recovery attack on 805-round TriviumMassive superpoly recovery with nested monomial predictionsStretching cube attacks: improved methods to recover massive superpoliesFrom unbalanced to perfect: implementation of low energy stream ciphersAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsThe decomposition of an NFSR into the cascade connection of two smaller NFSRs revisitedAn interleaved method for constructing de Bruijn sequencesCryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modesSome results on FruitThe MILP-aided conditional differential attack and its application to TriviumStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionFinding Effective SAT Partitionings Via Black-Box OptimizationEspresso: a stream cipher for 5G wireless communication systemsAn improved degree evaluation method of NFSR-based cryptosystemsNew cube distinguishers on NFSR-based stream ciphersA ring-like cascade connection and a class of NFSRs with the same cycle structuresModeling for three-subset division property without unknown subsetBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesTriviumOn the uniqueness of a type of cascade connection representations for NFSRsOn affine sub-families of the NFSR in grainA generic method for investigating nonsingular Galois NFSRs




This page was built for publication: Trivium