Trivium

From MaRDI portal
Software:18284



swMATH6150MaRDI QIDQ18284


No author found.





Related Items (88)

Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystemsStream/block ciphers, difference equations and algebraic attacksCombined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipherConditional Differential Cryptanalysis of Trivium and KATANImproved transformation algorithms for generalized Galois NLFSRsGrain-like structures with minimal and maximal period sequencesDifferential fault based key recovery attacks on TRIADA survey on implementation of lightweight block ciphers for resource constraints devicesCASca:A CA Based Scalable Stream CipherMemristor and trivium-based true random number generatorHigh order differential attacks on stream ciphersApplying cube attacks to stream ciphers in realistic scenariosOn the nonlinearity of maximum-length NFSR feedbacksState cycles, initialization and the Trivium stream cipherQuark: a lightweight hashCryptanalysis of a Chaotic Stream Cipher and Its Improved SchemeProgress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. ProceedingsCryptanalysis of Full SproutComparison of Cube Attacks Over Different Vector SpacesGrain-128AEADv2: strengthening the initialization against key reconstructionIsomorphism and equivalence of Galois nonlinear feedback shift registersCube Attack on Stream Ciphers using a Modified Linearity TestEnhanced-bivium algorithm for RFID systemOn black-box optimization in divide-and-conquer SAT solvingAnalyzing Boolean functions via solving parametric polynomial systemsA necessary and sufficient condition for a class of nonsingular Galois NFSRsRemote IP Protection Using Timing ChannelsOn a class of isomorphic NFSRsStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionChosen IV Statistical Analysis for Key Recovery Attacks on Stream CiphersTrivium: A Stream Cipher Construction Inspired by Block Cipher Design PrinciplesMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityCharacteristic set algorithms for equation solving in finite fieldsOptimising Gröbner bases on BiviumA note on determine the greatest common subfamily of two NFSRs by Gröbner basisAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsThe decomposition of an NFSR into the cascade connection of two smaller NFSRs revisitedOn the largest affine sub-families of a family of NFSR sequencesOn the efficiency of solving Boolean polynomial systems with the characteristic set methodAn interleaved method for constructing de Bruijn sequencesSome results on FruitSpeeding up the GVW algorithm via a substituting methodThe MILP-aided conditional differential attack and its application to TriviumFault analysis of TriviumStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionEspresso: a stream cipher for 5G wireless communication systemsAttacking Bivium and Trivium with the Characteristic Set MethodBreaking Grain-128 with Dynamic Cube AttacksUpper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexityObserving biases in the state: case studies with Trivium and Trivia-SCAn improved degree evaluation method of NFSR-based cryptosystemsDesign and analysis of small-state grain-like stream ciphersOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksProbabilistic signature based generalized framework for differential fault analysis of stream ciphersNew results on the state cycles of TriviumA new linearization method for nonlinear feedback shift registersAlgebraic Attacks on Clock-Controlled Stream CiphersInternal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attackFlaws in the Initialisation Process of Stream CiphersHard fault analysis of TriviumUnnamed ItemUnnamed ItemFurther results on the equivalence between Galois NFSRs and Fibonacci NFSRsNew cube distinguishers on NFSR-based stream ciphersSearch heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealingQUAD: A multivariate stream cipher with provable securityUnnamed ItemA ring-like cascade connection and a class of NFSRs with the same cycle structuresAdvanced Algebraic Attack on TriviumModeling for three-subset division property without unknown subsetEfficient RFID authentication protocols based on pseudorandom sequence generatorsSecure Communication Systems Based on the Synchronization of Chaotic SystemsCube Attacks on Tweakable Black Box PolynomialsHill Climbing Algorithms and TriviumA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANOn Galois NFSRs equivalent to Fibonacci onesBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesAlgebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift RegistersNumerical solvers and cryptanalysisOn the uniqueness of a type of cascade connection representations for NFSRsHardware optimizations of stream cipher rabbitSlid Pairs in Salsa20 and TriviumFloating Fault Analysis of TriviumParallel Scalar Multiplication on Elliptic Curves in Wireless Sensor NetworksOn affine sub-families of the NFSR in grainNew general framework for algebraic degree evaluation of NFSR-based cryptosystemsA generic method for investigating nonsingular Galois NFSRsA Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters


This page was built for software: Trivium