Trivium
From MaRDI portal
Software:18284
No author found.
Related Items (88)
Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ Stream/block ciphers, difference equations and algebraic attacks ⋮ Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher ⋮ Conditional Differential Cryptanalysis of Trivium and KATAN ⋮ Improved transformation algorithms for generalized Galois NLFSRs ⋮ Grain-like structures with minimal and maximal period sequences ⋮ Differential fault based key recovery attacks on TRIAD ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ CASca:A CA Based Scalable Stream Cipher ⋮ Memristor and trivium-based true random number generator ⋮ High order differential attacks on stream ciphers ⋮ Applying cube attacks to stream ciphers in realistic scenarios ⋮ On the nonlinearity of maximum-length NFSR feedbacks ⋮ State cycles, initialization and the Trivium stream cipher ⋮ Quark: a lightweight hash ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ Progress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. Proceedings ⋮ Cryptanalysis of Full Sprout ⋮ Comparison of Cube Attacks Over Different Vector Spaces ⋮ Grain-128AEADv2: strengthening the initialization against key reconstruction ⋮ Isomorphism and equivalence of Galois nonlinear feedback shift registers ⋮ Cube Attack on Stream Ciphers using a Modified Linearity Test ⋮ Enhanced-bivium algorithm for RFID system ⋮ On black-box optimization in divide-and-conquer SAT solving ⋮ Analyzing Boolean functions via solving parametric polynomial systems ⋮ A necessary and sufficient condition for a class of nonsingular Galois NFSRs ⋮ Remote IP Protection Using Timing Channels ⋮ On a class of isomorphic NFSRs ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers ⋮ Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ Characteristic set algorithms for equation solving in finite fields ⋮ Optimising Gröbner bases on Bivium ⋮ A note on determine the greatest common subfamily of two NFSRs by Gröbner basis ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited ⋮ On the largest affine sub-families of a family of NFSR sequences ⋮ On the efficiency of solving Boolean polynomial systems with the characteristic set method ⋮ An interleaved method for constructing de Bruijn sequences ⋮ Some results on Fruit ⋮ Speeding up the GVW algorithm via a substituting method ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ Fault analysis of Trivium ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Attacking Bivium and Trivium with the Characteristic Set Method ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Design and analysis of small-state grain-like stream ciphers ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ Probabilistic signature based generalized framework for differential fault analysis of stream ciphers ⋮ New results on the state cycles of Trivium ⋮ A new linearization method for nonlinear feedback shift registers ⋮ Algebraic Attacks on Clock-Controlled Stream Ciphers ⋮ Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack ⋮ Flaws in the Initialisation Process of Stream Ciphers ⋮ Hard fault analysis of Trivium ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ Search heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealing ⋮ QUAD: A multivariate stream cipher with provable security ⋮ Unnamed Item ⋮ A ring-like cascade connection and a class of NFSRs with the same cycle structures ⋮ Advanced Algebraic Attack on Trivium ⋮ Modeling for three-subset division property without unknown subset ⋮ Efficient RFID authentication protocols based on pseudorandom sequence generators ⋮ Secure Communication Systems Based on the Synchronization of Chaotic Systems ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Hill Climbing Algorithms and Trivium ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ On Galois NFSRs equivalent to Fibonacci ones ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers ⋮ Numerical solvers and cryptanalysis ⋮ On the uniqueness of a type of cascade connection representations for NFSRs ⋮ Hardware optimizations of stream cipher rabbit ⋮ Slid Pairs in Salsa20 and Trivium ⋮ Floating Fault Analysis of Trivium ⋮ Parallel Scalar Multiplication on Elliptic Curves in Wireless Sensor Networks ⋮ On affine sub-families of the NFSR in grain ⋮ New general framework for algebraic degree evaluation of NFSR-based cryptosystems ⋮ A generic method for investigating nonsingular Galois NFSRs ⋮ A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters
This page was built for software: Trivium