eSTREAM
From MaRDI portal
Software:24625
swMATH12699MaRDI QIDQ24625FDOQ24625
Author name not available (Why is that?)
Cited In (only showing first 100 items - show all)
- Stream/block ciphers, difference equations and algebraic attacks
- FAN: a lightweight authenticated cryptographic algorithm
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- An efficient state recovery attack on the X-FCSR family of stream ciphers
- Differential fault based key recovery attacks on TRIAD
- Breaking the F-FCSR-H Stream Cipher in Real Time
- Flatness and structural analysis as a constructive framework for private communication
- Conditional differential cryptanalysis of 105 round Grain v1
- Walsh transforms and cryptographic applications in bias computing
- Optimal parameters for the WG stream cipher family
- Characteristic set algorithms for equation solving in finite fields
- More permutations and involutions for constructing bent functions
- Analysis of the generalized self-shrinking generator
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Improved results on periodic multisequences with large error linear complexity
- ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
- Attacking Bivium Using SAT Solvers
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- CASca:A CA Based Scalable Stream Cipher
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
- QUAD: A multivariate stream cipher with provable security
- A novel method for reconstructing period with single input in NFSR
- An Improved Hardware Implementation of the Grain-128a Stream Cipher
- Fault Analysis of Grain-128 by Targeting NFSR
- WG: a family of stream ciphers with designed randomness properties
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Rapid hardware design for cryptographic modules with filtering structures over small finite fields
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Rotational rebound attacks on reduced Skein
- Attacking Bivium and Trivium with the Characteristic Set Method
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Near Collision Attack on the Grain v1 Stream Cipher
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- New AES Software Speed Records
- Enhanced-bivium algorithm for RFID system
- Nonlinear vectorial primitive recursive sequences
- Correlation attacks on combination generators
- On the nonlinearity of maximum-length NFSR feedbacks
- Improved distinguishers for HC-128
- Secure and Computationally Efficient Cryptographic Primitive Based on Cellular Automaton
- A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences
- Design and analysis of small-state grain-like stream ciphers
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Greedy Distinguishers and Nonrandomness Detectors
- Optimising Gröbner bases on Bivium
- An overview of distinguishing attacks on stream ciphers
- Espresso: a stream cipher for 5G wireless communication systems
- A new multi-linear universal hash family
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Cube Attacks on Tweakable Black Box Polynomials
- Slid Pairs in Salsa20 and Trivium
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- Floating Fault Analysis of Trivium
- Further non-randomness in RC4, RC4A and VMPC
- Cryptographic properties of nonlinear pseudorandom number generators
- New characterizations and construction methods of bent and hyper-bent Boolean functions
- Fault analysis of Trivium
- Differential Fault Attack on Grain v1, ACORN v3 and Lizard
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
- QUAD: A Practical Stream Cipher with Provable Security
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- On the Key-Stream Periods Probability of Edon80
- New cube distinguishers on NFSR-based stream ciphers
- New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- A Low-Area Yet Performant FPGA Implementation of Shabal
- Hill Climbing Algorithms and Trivium
- Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags
- Cryptanalysis of \texttt{NORX} v2.0
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
- On black-box optimization in divide-and-conquer SAT solving
- New results on the state cycles of Trivium
- Flaws in the Initialisation Process of Stream Ciphers
- Hardware optimizations of stream cipher rabbit
- Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
- One Word/Cycle HC-128 Accelerator via State-Splitting Optimization
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Grain-128AEADv2: strengthening the initialization against key reconstruction
- State cycles, initialization and the Trivium stream cipher
- Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
- Left invertibility, flatness and identifiability of switched linear dynamical systems: a framework for cryptographic applications
- Hard fault analysis of Trivium
- A heuristic approach towards variability of HC-128
- Analysis of variability and degree of non-linearity of HC-128
- On Galois NFSRs equivalent to Fibonacci ones
- On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR
- Revamped differential-linear cryptanalysis on reduced round ChaCha
- Differential Fault Analysis of Sosemanuk
- Investigating four neighbourhood cellular automata as better cryptographic primitives
- Designing integrated accelerator for stream ciphers with structural similarities
- Свойства последовательностей, вырабатываемых комбинирующими генераторами над конечными полями
- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption
- Cryptanalysis of the stream cipher LEX
- Parallel Scalar Multiplication on Elliptic Curves in Wireless Sensor Networks
This page was built for software: eSTREAM