QUAD: A Practical Stream Cipher with Provable Security
From MaRDI portal
Publication:3593092
DOI10.1007/11761679_8zbMATH Open1140.94322OpenAlexW1495150777MaRDI QIDQ3593092FDOQ3593092
Authors: Côme Berbain, Henri Gilbert, Jacques Patarin
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_8
Recommendations
- Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds
- \(n\)-quasigroup cryptographic primitives: stream ciphers
- The cube attack on stream cipher Trivium and quadraticity tests
- scientific article; zbMATH DE number 883938
- Provable security against generic attacks on stream ciphers
- Tight security bounds for generic stream cipher constructions
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- On the Security of IV Dependent Stream Ciphers
Cites Work
- A Pseudorandom Generator from any One-way Function
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Efficient algorithms for solving overdefined systems of multivariate polynomial equations
- Title not available (Why is that?)
- Foundations of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Simple Unpredictable Pseudo-Random Number Generator
- Efficient cryptographic schemes provably as secure as subset sum
- Three XOR-lemmas -- an exposition
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- The XL-Algorithm and a Conjecture from Commutative Algebra
- Comparison Between XL and Gröbner Basis Algorithms
- Title not available (Why is that?)
- Complexity of solving algebraic equations
- Title not available (Why is that?)
Cited In (19)
- Cryptanalysis of the TRMS Signature Scheme of PKC’05
- Analysis of Multivariate Hash Functions
- QUAD: A multivariate stream cipher with provable security
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
- Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds
- A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers
- Building Secure Block Ciphers on Generic Attacks Assumptions
- Analysis of QUAD
- Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$
- Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU
- 10-party sublinear secure computation from standard assumptions
- Non-interactive zero-knowledge from LPN and MQ
- Fuzzy matching template attacks on multivariate cryptography: a case study
- Hybrid MQ Signature for Embedded Device
- An overview of distinguishing attacks on stream ciphers
- More efficient DDH pseudorandom generators
- Syndrome Based Collision Resistant Hashing
- General Fault Attacks on Multivariate Public Key Cryptosystems
- On the Security of IV Dependent Stream Ciphers
Uses Software
This page was built for publication: QUAD: A Practical Stream Cipher with Provable Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3593092)