\mathcal{TCH}o : A Hardware-Oriented Trapdoor Cipher
From MaRDI portal
Publication:3608916
DOI10.1007/978-3-540-73458-1_15zbMATH Open1213.94078OpenAlexW1544773214MaRDI QIDQ3608916FDOQ3608916
Authors: Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
Publication date: 6 March 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73458-1_15
Recommendations
hardwarelinear feedback shift registerpost-quantum cryptographypublic-key cryptosystempolynomial multiples
Cited In (8)
- When Stream Cipher Analysis Meets Public-Key Cryptography
- Divisibility of polynomials over finite fields and combinatorial applications
- How to Encrypt with the LPN Problem
- On Privacy Models for RFID
- Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications
- An approach for stream ciphers design based on joint computing over random and secret data
- Computing sparse multiples of polynomials
- A Practical Key Recovery Attack on Basic TCHo
This page was built for publication: $\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3608916)