Observing biases in the state: case studies with Trivium and Trivia-SC
From MaRDI portal
(Redirected from Publication:510484)
Recommendations
- Biases in bias elicitation
- CHARACTERIZATION OF STATE ESTIMATION BIASES
- Beyond plurality: truth-bias in binary scoring rules
- Special issue on bias evaluation and selection
- Evidence of randomisation bias in a large-scale social experiment: the case of ERA
- Model-based measures for detecting and quantifying response bias
- Collective bias models in two-tier voting systems and the democracy deficit
- We should focus on the biases that matter: a reply to commentaries
Cites work
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- scientific article; zbMATH DE number 1418257 (Why is no real title available?)
- scientific article; zbMATH DE number 1424170 (Why is no real title available?)
- scientific article; zbMATH DE number 2221909 (Why is no real title available?)
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- A chosen IV related key attack on Grain-128a
- Adavanced slide attacks
- Algebraic and Slide Attacks on KeeLoq
- Analysis of Grain’s Initialization Algorithm
- Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Cube Attacks on Tweakable Black Box Polynomials
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Greedy distinguishers and nonrandomness detectors
- Improved Slide Attacks
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- Linear cryptanalysis of FASER128/256 and TriviA-ck
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Self-testing/correcting with applications to numerical problems
- Slid Pairs in Salsa20 and Trivium
- TriviA: a fast and secure authenticated encryption scheme
- Two Trivial Attacks on Trivium
Cited in
(9)- Efficient quantum algorithms related to autocorrelation spectrum
- New cube distinguishers on NFSR-based stream ciphers
- A new method for searching cubes and its application to 815-round trivium
- Some cryptanalytic results on TRIAD
- State cycles, initialization and the Trivium stream cipher
- Greedy distinguishers and nonrandomness detectors
- Linear biases in AEGIS keystream
- A practical key-recovery attack on 805-round Trivium
- Some results on lightweight stream ciphers Fountain v1 \& lizard
This page was built for publication: Observing biases in the state: case studies with Trivium and Trivia-SC
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q510484)