Trivium
From MaRDI portal
Software:18284
swMATH6150MaRDI QIDQ18284FDOQ18284
Author name not available (Why is that?)
Cited In (88)
- Analyzing Boolean functions via solving parametric polynomial systems
- The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited
- The MILP-aided conditional differential attack and its application to Trivium
- Hill Climbing Algorithms and Trivium
- On black-box optimization in divide-and-conquer SAT solving
- An improved degree evaluation method of NFSR-based cryptosystems
- Title not available (Why is that?)
- Flaws in the Initialisation Process of Stream Ciphers
- Hardware optimizations of stream cipher rabbit
- Remote IP Protection Using Timing Channels
- Advanced Algebraic Attack on Trivium
- On a class of isomorphic NFSRs
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- Parallel Scalar Multiplication on Elliptic Curves in Wireless Sensor Networks
- On the uniqueness of a type of cascade connection representations for NFSRs
- Solving Trivium-based Boolean equations using the method of syllogisms
- Numerical solvers and cryptanalysis
- A necessary and sufficient condition for a class of nonsingular Galois NFSRs
- Algebraic Attacks on Clock-Controlled Stream Ciphers
- Cube Attack on Stream Ciphers using a Modified Linearity Test
- Stream/block ciphers, difference equations and algebraic attacks
- Improved transformation algorithms for generalized Galois NLFSRs
- Some results on Fruit
- A survey on implementation of lightweight block ciphers for resource constraints devices
- New general framework for algebraic degree evaluation of NFSR-based cryptosystems
- Quark: a lightweight hash
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Grain-like structures with minimal and maximal period sequences
- Differential fault based key recovery attacks on TRIAD
- Speeding up the GVW algorithm via a substituting method
- Cryptanalysis of Full Sprout
- New cube distinguishers on NFSR-based stream ciphers
- Secure Communication Systems Based on the Synchronization of Chaotic Systems
- A generic method for investigating nonsingular Galois NFSRs
- Characteristic set algorithms for equation solving in finite fields
- A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters
- Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs
- High order differential attacks on stream ciphers
- CASca:A CA Based Scalable Stream Cipher
- On affine sub-families of the NFSR in grain
- New results on the state cycles of Trivium
- QUAD: A multivariate stream cipher with provable security
- On the largest affine sub-families of a family of NFSR sequences
- Memristor and trivium-based true random number generator
- Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Grain-128AEADv2: strengthening the initialization against key reconstruction
- State cycles, initialization and the Trivium stream cipher
- A new linearization method for nonlinear feedback shift registers
- Hard fault analysis of Trivium
- Isomorphism and equivalence of Galois nonlinear feedback shift registers
- Attacking Bivium and Trivium with the Characteristic Set Method
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Modeling for three-subset division property without unknown subset
- Search heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealing
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Enhanced-bivium algorithm for RFID system
- Applying cube attacks to stream ciphers in realistic scenarios
- On the nonlinearity of maximum-length NFSR feedbacks
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- On Galois NFSRs equivalent to Fibonacci ones
- Comparison of Cube Attacks Over Different Vector Spaces
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- A ring-like cascade connection and a class of NFSRs with the same cycle structures
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Design and analysis of small-state grain-like stream ciphers
- A note on determine the greatest common subfamily of two NFSRs by Gröbner basis
- Title not available (Why is that?)
- Breaking Grain-128 with Dynamic Cube Attacks
- Optimising Gröbner bases on Bivium
- Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
- Espresso: a stream cipher for 5G wireless communication systems
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Progress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. Proceedings
- Cube Attacks on Tweakable Black Box Polynomials
- Slid Pairs in Salsa20 and Trivium
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- Floating Fault Analysis of Trivium
- Fault analysis of Trivium
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
- An interleaved method for constructing de Bruijn sequences
This page was built for software: Trivium