swMATH12699MaRDI QIDQ24625FDOQ24625
Author name not available (Why is that?)
Official website: http://www.ecrypt.eu.org/stream/
Cited In (only showing first 100 items - show all)
- Stream/block ciphers, difference equations and algebraic attacks
- Enocoro
- Fruit
- FAN: a lightweight authenticated cryptographic algorithm
- Secure and computationally efficient cryptographic primitive based on cellular automaton
- Fault analysis of grain-128 by targeting NFSR
- An efficient state recovery attack on the X-FCSR family of stream ciphers
- TRIAD
- Differential fault based key recovery attacks on TRIAD
- Breaking the F-FCSR-H Stream Cipher in Real Time
- Conditional differential cryptanalysis of 105 round Grain v1
- Walsh transforms and cryptographic applications in bias computing
- Characteristic set algorithms for equation solving in finite fields
- Analysis of the generalized self-shrinking generator
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- Attacking Bivium and Trivium with the characteristic set method
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Improved results on periodic multisequences with large error linear complexity
- ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
- Attacking Bivium Using SAT Solvers
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Near collision attack on the Grain v1 stream cipher
- QUAD: A multivariate stream cipher with provable security
- WG: a family of stream ciphers with designed randomness properties
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Greedy distinguishers and nonrandomness detectors
- Rotational rebound attacks on reduced Skein
- slimgb
- Salsa20
- Trivium
- ChaCha
- Rumba20
- Rabbit
- Diehard
- CAR30
- TestU01
- TinyECC
- eBACS
- MICKEY
- CryptoMiniSat
- SOSEMANUK
- NanGate
- CASca
- CASTREAM
- Espresso
- Grain
- MaD2
- LEX
- QUAD
- SNOW
- SHIELD
- NIST Statistical Test Suite
- MMH
- Poly1305-AES
- tuftests
- estreambench
- On the nonlinearity of maximum-length NFSR feedbacks
- Improved distinguishers for HC-128
- Edon80
- XTEA
- CAG
- A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Optimising Gröbner bases on Bivium
- An overview of distinguishing attacks on stream ciphers
- Espresso: a stream cipher for 5G wireless communication systems
- A new multi-linear universal hash family
- Cube Attacks on Tweakable Black Box Polynomials
- Slid Pairs in Salsa20 and Trivium
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Floating Fault Analysis of Trivium
- Further non-randomness in RC4, RC4A and VMPC
- Cryptographic properties of nonlinear pseudorandom number generators
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- CASca: a CA based scalable stream cipher
- Fault analysis of Trivium
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
- QUAD: A Practical Stream Cipher with Provable Security
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- FAN
- WAGE
- Parallel scalar multiplication on elliptic curves in wireless sensor networks
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Hardware optimizations of stream cipher Rabbit
- Flatness and structural analysis as a constructive framework for private communication
- New cube distinguishers on NFSR-based stream ciphers
- One word/cycle HC-128 accelerator via state-splitting optimization
- Flaws in the initialisation process of stream ciphers
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- Optimal parameters for the WG stream cipher family
- More permutations and involutions for constructing bent functions
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Cryptanalysis of \texttt{NORX} v2.0
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
- On black-box optimization in divide-and-conquer SAT solving
- \(d\)-monomial tests of nonlinear cellular automata for cryptographic design
This page was built for software: eSTREAM