Cryptanalysis of Grain
From MaRDI portal
Publication:3618641
Recommendations
Cited in
(28)- Conditional differential cryptanalysis of 105 round Grain v1
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Cryptanalysis of Achterbahn-128/80
- Fast Correlation Attacks: Methods and Countermeasures
- Fast near collision attack on the Grain v1 stream cipher
- Cube attack on grain
- Cryptanalysis of the stream cipher LEX
- Cryptanalysis of the light-weight cipher A2U2
- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- Key recovery attacks on grain-like keystream generators with key injection
- Some results on related key-IV pairs of grain
- Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
- Cryptanalysis of Loiss stream cipher -- revisited
- Two generic methods of analyzing stream ciphers
- Cryptanalysis of Acorn in nonce-reuse setting
- Near collision attack on the Grain v1 stream cipher
- Algebraic attacks on grain-like keystream generators
- Analysis of Grain’s Initialization Algorithm
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
- Security analysis of linearly filtered NLFSRs
- Espresso: a stream cipher for 5G wireless communication systems
- Near collision attack against Grain v1
- An observation of non-randomness in the grain family of stream ciphers with reduced initialization round
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- An AEAD variant of the Grain stream cipher
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
This page was built for publication: Cryptanalysis of Grain
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3618641)