Trivium
From MaRDI portal
Publication:3510915
DOI10.1007/978-3-540-68351-3_18zbMath1285.94054OpenAlexW4234875403MaRDI QIDQ3510915
Christophe De Cannière, Bart Preneel
Publication date: 3 July 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68351-3_18
Related Items (41)
Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ Grain-like structures with minimal and maximal period sequences ⋮ Quark: a lightweight hash ⋮ LHash: A Lightweight Hash Function ⋮ Isomorphism and equivalence of Galois nonlinear feedback shift registers ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ A necessary and sufficient condition for a class of nonsingular Galois NFSRs ⋮ The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications ⋮ A new upper bound on the order of affine sub-families of NFSRs ⋮ An Equivalence-Preserving Transformation of Shift Registers ⋮ Improved Multi-Bit Differential Fault Analysis of Trivium ⋮ On a class of isomorphic NFSRs ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ ALE: AES-Based Lightweight Authenticated Encryption ⋮ Improved graph-based model for recovering superpoly on Trivium ⋮ Cryptanalysis of reduced round SPEEDY ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ Higher-order masking scheme for Trivium hardware implementation ⋮ A practical key-recovery attack on 805-round Trivium ⋮ Massive superpoly recovery with nested monomial predictions ⋮ Stretching cube attacks: improved methods to recover massive superpolies ⋮ From unbalanced to perfect: implementation of low energy stream ciphers ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited ⋮ An interleaved method for constructing de Bruijn sequences ⋮ Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes ⋮ Some results on Fruit ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Finding Effective SAT Partitionings Via Black-Box Optimization ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ A ring-like cascade connection and a class of NFSRs with the same cycle structures ⋮ Modeling for three-subset division property without unknown subset ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ Trivium ⋮ On the uniqueness of a type of cascade connection representations for NFSRs ⋮ On affine sub-families of the NFSR in grain ⋮ A generic method for investigating nonsingular Galois NFSRs
This page was built for publication: Trivium