Cryptanalysis of Grain
From MaRDI portal
Publication:3618641
Recommendations
Cited in
(28)- Algebraic attacks on grain-like keystream generators
- Conditional differential cryptanalysis of 105 round Grain v1
- Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
- Cryptanalysis of the light-weight cipher A2U2
- Some results on related key-IV pairs of grain
- Cryptanalysis of Loiss stream cipher -- revisited
- Cryptanalysis of Achterbahn-128/80
- Cryptanalysis of Acorn in nonce-reuse setting
- Fast near collision attack on the Grain v1 stream cipher
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- Near collision attack on the Grain v1 stream cipher
- Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
- An AEAD variant of the Grain stream cipher
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
- An observation of non-randomness in the grain family of stream ciphers with reduced initialization round
- Two generic methods of analyzing stream ciphers
- Cryptanalysis of the stream cipher LEX
- Fast Correlation Attacks: Methods and Countermeasures
- Espresso: a stream cipher for 5G wireless communication systems
- Analysis of Grain’s Initialization Algorithm
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Cube attack on grain
- Near collision attack against Grain v1
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- Key recovery attacks on grain-like keystream generators with key injection
- Security analysis of linearly filtered NLFSRs
This page was built for publication: Cryptanalysis of Grain
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3618641)