Grain
From MaRDI portal
Software:31366
No author found.
Related Items (88)
More permutations and involutions for constructing bent functions ⋮ Conditional differential cryptanalysis of 105 round Grain v1 ⋮ Improving Division Property Based Cube Attacks by Removing Invalid Monomials ⋮ Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications ⋮ Differential-linear cryptanalysis from an algebraic perspective ⋮ On usage of cellular automata in strengthening stream ciphers ⋮ Improved transformation algorithms for generalized Galois NLFSRs ⋮ Grain-like structures with minimal and maximal period sequences ⋮ CASca:A CA Based Scalable Stream Cipher ⋮ High order differential attacks on stream ciphers ⋮ On the nonlinearity of maximum-length NFSR feedbacks ⋮ Quark: a lightweight hash ⋮ A novel method for reconstructing period with single input in NFSR ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ Differential Fault Attack on Grain v1, ACORN v3 and Lizard ⋮ Cryptanalysis of Full Sprout ⋮ Grain-128AEADv2: strengthening the initialization against key reconstruction ⋮ Isomorphism and equivalence of Galois nonlinear feedback shift registers ⋮ CAR30: a new scalable stream cipher with rule 30 ⋮ Pseudorandom bit sequence generator for stream cipher based on elliptic curves ⋮ On black-box optimization in divide-and-conquer SAT solving ⋮ Stretching de Bruijn sequences ⋮ A necessary and sufficient condition for a class of nonsingular Galois NFSRs ⋮ The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications ⋮ A new upper bound on the order of affine sub-families of NFSRs ⋮ On a class of isomorphic NFSRs ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ A new distinguishing attack on Grain-V1 with 111 initialization rounds ⋮ Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ Quantum security of grain-128/grain-128a stream cipher against HHL algorithm ⋮ Message authentication based on cryptographically secure CRC without polynomial irreducibility test ⋮ New characterizations and construction methods of bent and hyper-bent Boolean functions ⋮ A note on determine the greatest common subfamily of two NFSRs by Gröbner basis ⋮ Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 ⋮ Derivatives of bent functions in connection with the bent sum decomposition problem ⋮ The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited ⋮ On the largest affine sub-families of a family of NFSR sequences ⋮ The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices ⋮ An interleaved method for constructing de Bruijn sequences ⋮ On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR ⋮ Rapid hardware design for cryptographic modules with filtering structures over small finite fields ⋮ Some results on Fruit ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Fault Analysis of Grain-128 by Targeting NFSR ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ On affine sub-families of Grain-like structures ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Design and analysis of small-state grain-like stream ciphers ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ Probabilistic signature based generalized framework for differential fault analysis of stream ciphers ⋮ Weightwise perfectly balanced functions with high weightwise nonlinearity profile ⋮ A new linearization method for nonlinear feedback shift registers ⋮ An Improved Hardware Implementation of the Grain-128a Stream Cipher ⋮ Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR ⋮ Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector ⋮ Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack ⋮ Flaws in the Initialisation Process of Stream Ciphers ⋮ Greedy Distinguishers and Nonrandomness Detectors ⋮ A new result on irreducible NFSRs with respect to cascade connection ⋮ Unnamed Item ⋮ Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ QUAD: A multivariate stream cipher with provable security ⋮ Unnamed Item ⋮ A ring-like cascade connection and a class of NFSRs with the same cycle structures ⋮ Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks ⋮ Modeling for three-subset division property without unknown subset ⋮ Efficient RFID authentication protocols based on pseudorandom sequence generators ⋮ Deterministic chaotic finite-state automata ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ On Galois NFSRs equivalent to Fibonacci ones ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers ⋮ Constructing de Bruijn Sequences Based on a New Necessary Condition ⋮ On the Stability of m-Sequences ⋮ On the uniqueness of a type of cascade connection representations for NFSRs ⋮ An AEAD variant of the Grain stream cipher ⋮ Hardware optimizations of stream cipher rabbit ⋮ On affine sub-families of the NFSR in grain ⋮ Algebraic attacks on grain-like keystream generators ⋮ New general framework for algebraic degree evaluation of NFSR-based cryptosystems ⋮ The method for constructing uniform planar approximations of the filter generator ⋮ Критерии проверки гипотезы о наличии зашумленной функциональной зависимости между случайными двоичными векторами и битами ⋮ A generic method for investigating nonsingular Galois NFSRs ⋮ A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
This page was built for software: Grain