Tight security bounds for generic stream cipher constructions
From MaRDI portal
(Redirected from Publication:778931)
Recommendations
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Design and analysis of small-state grain-like stream ciphers
- On lightweight stream ciphers with shorter internal states
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- scientific article; zbMATH DE number 1583765
Cited in
(11)- QUAD: A Practical Stream Cipher with Provable Security
- scientific article; zbMATH DE number 1583930 (Why is no real title available?)
- scientific article; zbMATH DE number 6429293 (Why is no real title available?)
- Stream Ciphering Techniques Based on n-Tuples Juxtaposition Sequences
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- On lightweight stream ciphers with shorter internal states
- Provable security against generic attacks on stream ciphers
- On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet
- Design and analysis of small-state grain-like stream ciphers
- Some results on lightweight stream ciphers Fountain v1 \& lizard
This page was built for publication: Tight security bounds for generic stream cipher constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778931)