QUAD: A Practical Stream Cipher with Provable Security
From MaRDI portal
Publication:3593092
Recommendations
- Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds
- \(n\)-quasigroup cryptographic primitives: stream ciphers
- The cube attack on stream cipher Trivium and quadraticity tests
- scientific article; zbMATH DE number 883938
- Provable security against generic attacks on stream ciphers
- Tight security bounds for generic stream cipher constructions
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- On the Security of IV Dependent Stream Ciphers
Cites work
- scientific article; zbMATH DE number 2085432 (Why is no real title available?)
- scientific article; zbMATH DE number 5296403 (Why is no real title available?)
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 1107704 (Why is no real title available?)
- scientific article; zbMATH DE number 1942441 (Why is no real title available?)
- scientific article; zbMATH DE number 1962148 (Why is no real title available?)
- scientific article; zbMATH DE number 2009966 (Why is no real title available?)
- scientific article; zbMATH DE number 1759796 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- A Simple Unpredictable Pseudo-Random Number Generator
- Comparison Between XL and Gröbner Basis Algorithms
- Complexity of solving algebraic equations
- Efficient algorithms for solving overdefined systems of multivariate polynomial equations
- Efficient cryptographic schemes provably as secure as subset sum
- Foundations of Cryptography
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- The XL-Algorithm and a Conjecture from Commutative Algebra
- Three XOR-lemmas -- an exposition
Cited in
(19)- Cryptanalysis of the TRMS Signature Scheme of PKC’05
- QUAD: A multivariate stream cipher with provable security
- Analysis of Multivariate Hash Functions
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
- Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds
- A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers
- Building Secure Block Ciphers on Generic Attacks Assumptions
- Analysis of QUAD
- Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$
- Fuzzy matching template attacks on multivariate cryptography: a case study
- Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU
- Hybrid MQ Signature for Embedded Device
- 10-party sublinear secure computation from standard assumptions
- Non-interactive zero-knowledge from LPN and MQ
- An overview of distinguishing attacks on stream ciphers
- More efficient DDH pseudorandom generators
- Syndrome Based Collision Resistant Hashing
- General Fault Attacks on Multivariate Public Key Cryptosystems
- On the Security of IV Dependent Stream Ciphers
This page was built for publication: QUAD: A Practical Stream Cipher with Provable Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3593092)