New stream cipher designs. The eSTREAM finalists

From MaRDI portal
Publication:929893


DOI10.1007/978-3-540-68351-3zbMath1259.94006OpenAlexW2495326574MaRDI QIDQ929893

No author found.

Publication date: 19 June 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-68351-3



Related Items

Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator, FAN: a lightweight authenticated cryptographic algorithm, CASca:A CA Based Scalable Stream Cipher, On black-box optimization in divide-and-conquer SAT solving, The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications, On a class of isomorphic NFSRs, On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, ALE: AES-Based Lightweight Authenticated Encryption, Attacking Bivium Using SAT Solvers, Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró, Design Strategies for ARX with Provable Bounds: Sparx and LAX, Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró, Optimising Gröbner bases on Bivium, Krip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift register, Keymill: side-channel resilient key generator, a new concept for SCA-security by design, Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\), On the largest affine sub-families of a family of NFSR sequences, An interleaved method for constructing de Bruijn sequences, On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR, Finding Effective SAT Partitionings Via Black-Box Optimization, A NEW STREAM CIPHER BASED ON FIALKA M-125, Espresso: a stream cipher for 5G wireless communication systems, Fast Correlation Attacks: Methods and Countermeasures, The Additive Differential Probability of ARX, On affine sub-families of Grain-like structures, Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRs, Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR, An observation on NORX, BLAKE2, and ChaCha, Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack, A new result on irreducible NFSRs with respect to cascade connection, Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs, Period distribution of generalized discrete Arnold cat map, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, Improved linear approximations to ARX ciphers and attacks against ChaCha, Constructing de Bruijn Sequences Based on a New Necessary Condition, When lagged Fibonacci generators jump, On the uniqueness of a type of cascade connection representations for NFSRs, Cryptanalysis of Loiss stream cipher -- revisited, On affine sub-families of the NFSR in grain, A generic method for investigating nonsingular Galois NFSRs