Grain

From MaRDI portal
Software:31366



swMATH19539MaRDI QIDQ31366


No author found.





Related Items (88)

More permutations and involutions for constructing bent functionsConditional differential cryptanalysis of 105 round Grain v1Improving Division Property Based Cube Attacks by Removing Invalid MonomialsDuplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsDifferential-linear cryptanalysis from an algebraic perspectiveOn usage of cellular automata in strengthening stream ciphersImproved transformation algorithms for generalized Galois NLFSRsGrain-like structures with minimal and maximal period sequencesCASca:A CA Based Scalable Stream CipherHigh order differential attacks on stream ciphersOn the nonlinearity of maximum-length NFSR feedbacksQuark: a lightweight hashA novel method for reconstructing period with single input in NFSRCryptanalysis of a Chaotic Stream Cipher and Its Improved SchemeDifferential Fault Attack on Grain v1, ACORN v3 and LizardCryptanalysis of Full SproutGrain-128AEADv2: strengthening the initialization against key reconstructionIsomorphism and equivalence of Galois nonlinear feedback shift registersCAR30: a new scalable stream cipher with rule 30Pseudorandom bit sequence generator for stream cipher based on elliptic curvesOn black-box optimization in divide-and-conquer SAT solvingStretching de Bruijn sequencesA necessary and sufficient condition for a class of nonsingular Galois NFSRsThe cycle structure of \(\mathrm{NFSR}(f^d)\) and its applicationsA new upper bound on the order of affine sub-families of NFSRsOn a class of isomorphic NFSRsNear Collision Attack on the Grain v1 Stream CipherA new distinguishing attack on Grain-V1 with 111 initialization roundsConstruction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphersMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityQuantum security of grain-128/grain-128a stream cipher against HHL algorithmMessage authentication based on cryptographically secure CRC without polynomial irreducibility testNew characterizations and construction methods of bent and hyper-bent Boolean functionsA note on determine the greatest common subfamily of two NFSRs by Gröbner basisGeneric cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128Derivatives of bent functions in connection with the bent sum decomposition problemThe decomposition of an NFSR into the cascade connection of two smaller NFSRs revisitedOn the largest affine sub-families of a family of NFSR sequencesThe transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matricesAn interleaved method for constructing de Bruijn sequencesOn Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSRRapid hardware design for cryptographic modules with filtering structures over small finite fieldsSome results on FruitThe MILP-aided conditional differential attack and its application to TriviumAlgebraic cryptanalysis of stream ciphers using decomposition of Boolean functionEspresso: a stream cipher for 5G wireless communication systemsFault Analysis of Grain-128 by Targeting NFSRBreaking Grain-128 with Dynamic Cube AttacksOn affine sub-families of Grain-like structuresAn improved degree evaluation method of NFSR-based cryptosystemsDesign and analysis of small-state grain-like stream ciphersOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksProbabilistic signature based generalized framework for differential fault analysis of stream ciphersWeightwise perfectly balanced functions with high weightwise nonlinearity profileA new linearization method for nonlinear feedback shift registersAn Improved Hardware Implementation of the Grain-128a Stream CipherConstructions of de Bruijn sequences from a full-length shift register and an irreducible LFSRModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorInternal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attackFlaws in the Initialisation Process of Stream CiphersGreedy Distinguishers and Nonrandomness DetectorsA new result on irreducible NFSRs with respect to cascade connectionUnnamed ItemFurther results on the equivalence between Galois NFSRs and Fibonacci NFSRsNew cube distinguishers on NFSR-based stream ciphersQUAD: A multivariate stream cipher with provable securityUnnamed ItemA ring-like cascade connection and a class of NFSRs with the same cycle structuresPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksModeling for three-subset division property without unknown subsetEfficient RFID authentication protocols based on pseudorandom sequence generatorsDeterministic chaotic finite-state automataA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANOn Galois NFSRs equivalent to Fibonacci onesBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesAlgebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift RegistersConstructing de Bruijn Sequences Based on a New Necessary ConditionOn the Stability of m-SequencesOn the uniqueness of a type of cascade connection representations for NFSRsAn AEAD variant of the Grain stream cipherHardware optimizations of stream cipher rabbitOn affine sub-families of the NFSR in grainAlgebraic attacks on grain-like keystream generatorsNew general framework for algebraic degree evaluation of NFSR-based cryptosystemsThe method for constructing uniform planar approximations of the filter generatorКритерии проверки гипотезы о наличии зашумленной функциональной зависимости между случайными двоичными векторами и битамиA generic method for investigating nonsingular Galois NFSRsA state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a


This page was built for software: Grain