eSTREAM
From MaRDI portal
Software:24625
swMATH12699MaRDI QIDQ24625FDOQ24625
Author name not available (Why is that?)
Cited In (only showing first 100 items - show all)
- Stream/block ciphers, difference equations and algebraic attacks
- FAN: a lightweight authenticated cryptographic algorithm
- Secure and computationally efficient cryptographic primitive based on cellular automaton
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Fault analysis of grain-128 by targeting NFSR
- An efficient state recovery attack on the X-FCSR family of stream ciphers
- Differential fault based key recovery attacks on TRIAD
- Breaking the F-FCSR-H Stream Cipher in Real Time
- Flatness and structural analysis as a constructive framework for private communication
- Conditional differential cryptanalysis of 105 round Grain v1
- Walsh transforms and cryptographic applications in bias computing
- Optimal parameters for the WG stream cipher family
- Characteristic set algorithms for equation solving in finite fields
- More permutations and involutions for constructing bent functions
- Analysis of the generalized self-shrinking generator
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Attacking Bivium and Trivium with the characteristic set method
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Improved results on periodic multisequences with large error linear complexity
- ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
- Attacking Bivium Using SAT Solvers
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Near collision attack on the Grain v1 stream cipher
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
- QUAD: A multivariate stream cipher with provable security
- A novel method for reconstructing period with single input in NFSR
- An Improved Hardware Implementation of the Grain-128a Stream Cipher
- WG: a family of stream ciphers with designed randomness properties
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Rapid hardware design for cryptographic modules with filtering structures over small finite fields
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Greedy distinguishers and nonrandomness detectors
- Rotational rebound attacks on reduced Skein
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- New AES Software Speed Records
- Enhanced-bivium algorithm for RFID system
- Nonlinear vectorial primitive recursive sequences
- Correlation attacks on combination generators
- On the nonlinearity of maximum-length NFSR feedbacks
- Improved distinguishers for HC-128
- A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences
- Design and analysis of small-state grain-like stream ciphers
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Optimising Gröbner bases on Bivium
- An overview of distinguishing attacks on stream ciphers
- Espresso: a stream cipher for 5G wireless communication systems
- A new multi-linear universal hash family
- Cube Attacks on Tweakable Black Box Polynomials
- Slid Pairs in Salsa20 and Trivium
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- Floating Fault Analysis of Trivium
- Further non-randomness in RC4, RC4A and VMPC
- Cryptographic properties of nonlinear pseudorandom number generators
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- New characterizations and construction methods of bent and hyper-bent Boolean functions
- CASca: a CA based scalable stream cipher
- Fault analysis of Trivium
- Differential Fault Attack on Grain v1, ACORN v3 and Lizard
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
- QUAD: A Practical Stream Cipher with Provable Security
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- Parallel scalar multiplication on elliptic curves in wireless sensor networks
- Hardware optimizations of stream cipher Rabbit
- New cube distinguishers on NFSR-based stream ciphers
- One word/cycle HC-128 accelerator via state-splitting optimization
- Flaws in the initialisation process of stream ciphers
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- Cryptanalysis of \texttt{NORX} v2.0
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
- On black-box optimization in divide-and-conquer SAT solving
- \(d\)-monomial tests of nonlinear cellular automata for cryptographic design
- New results on the state cycles of Trivium
- Differential fault analysis of Sosemanuk
- Properties of the output sequences of a combination generators over finite fields
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Grain-128AEADv2: strengthening the initialization against key reconstruction
- State cycles, initialization and the Trivium stream cipher
- Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
- Left invertibility, flatness and identifiability of switched linear dynamical systems: a framework for cryptographic applications
- Hard fault analysis of Trivium
- New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
- A heuristic approach towards variability of HC-128
- Analysis of variability and degree of non-linearity of HC-128
- On Galois NFSRs equivalent to Fibonacci ones
- Revamped differential-linear cryptanalysis on reduced round ChaCha
- Investigating four neighbourhood cellular automata as better cryptographic primitives
- Designing integrated accelerator for stream ciphers with structural similarities
- Cryptanalysis of the stream cipher LEX
- On the key-stream periods probability of Edon80
- Analysis of Diagonal Constants in Salsa
- Stretching de Bruijn sequences
- Optimized GPU implementation and performance analysis of HC series of stream ciphers
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
This page was built for software: eSTREAM