Tight security bounds for generic stream cipher constructions
From MaRDI portal
Publication:778931
DOI10.1007/978-3-030-38471-5_14zbMATH Open1453.94084OpenAlexW2950052038MaRDI QIDQ778931FDOQ778931
Authors: Matthias Hamann, Matthias Krause, Alexander Moch
Publication date: 21 July 2020
Full work available at URL: https://eprint.iacr.org/2019/007
Recommendations
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Design and analysis of small-state grain-like stream ciphers
- On lightweight stream ciphers with shorter internal states
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- scientific article; zbMATH DE number 1583765
provable securityrandom oracle modelstream cipherindistinguishabilitylightweight cryptographysymmetric-key cryptography
Cited In (11)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Stream Ciphering Techniques Based on n-Tuples Juxtaposition Sequences
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- On lightweight stream ciphers with shorter internal states
- Provable security against generic attacks on stream ciphers
- On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet
- Design and analysis of small-state grain-like stream ciphers
- Some results on lightweight stream ciphers Fountain v1 \& lizard
- QUAD: A Practical Stream Cipher with Provable Security
This page was built for publication: Tight security bounds for generic stream cipher constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778931)