swMATH19539MaRDI QIDQ31366FDOQ31366
Author name not available (Why is that?)
Official website: http://link.springer.com/chapter/10.1007/978-3-540-68351-3_14
Cited In (only showing first 100 items - show all)
- Fruit
- Some results on Fruit
- Quark: a lightweight hash
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Fault analysis of grain-128 by targeting NFSR
- Grain-like structures with minimal and maximal period sequences
- CAR30: a new scalable stream cipher with rule 30
- Conditional differential cryptanalysis of 105 round Grain v1
- Differential-linear cryptanalysis from an algebraic perspective
- More permutations and involutions for constructing bent functions
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- High order differential attacks on stream ciphers
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- On affine sub-families of the NFSR in grain
- Near collision attack on the Grain v1 stream cipher
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- QUAD: A multivariate stream cipher with provable security
- On the largest affine sub-families of a family of NFSR sequences
- A novel method for reconstructing period with single input in NFSR
- An Improved Hardware Implementation of the Grain-128a Stream Cipher
- An AEAD variant of the Grain stream cipher
- Rapid hardware design for cryptographic modules with filtering structures over small finite fields
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Greedy distinguishers and nonrandomness detectors
- Breaking Grain-128 with dynamic cube attacks
- A new linearization method for nonlinear feedback shift registers
- Cryptanalysis of a chaotic stream cipher and its improved scheme
- Trivium
- CubeHash
- Rumba20
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- Rabbit
- CAR30
- Quark
- MICKEY
- RAKAPOSHI
- SOSEMANUK
- eSTREAM
- CASca
- HiTag2
- CASTREAM
- URSA
- KTANTAN
- Transalg
- Pseudorandom bit sequence generator for stream cipher based on elliptic curves
- Constructing de Bruijn sequences based on a new necessary condition
- ALIAS
- Espresso
- MRG32k3a
- Itubee
- LEX
- NOCAS
- QUAD
- SNOW
- KATAN
- MMH
- Poly1305-AES
- DLCT
- mkplot
- On the nonlinearity of maximum-length NFSR feedbacks
- Edon80
- A ring-like cascade connection and a class of NFSRs with the same cycle structures
- Design and analysis of small-state grain-like stream ciphers
- A note on determine the greatest common subfamily of two NFSRs by Gröbner basis
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Cryptanalysis of full sprout
- Bosphorus
- Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
- Espresso: a stream cipher for 5G wireless communication systems
- SWIFFTX
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test
- On affine sub-families of Grain-like structures
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
- New characterizations and construction methods of bent and hyper-bent Boolean functions
- CASca: a CA based scalable stream cipher
- Differential Fault Attack on Grain v1, ACORN v3 and Lizard
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
- The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- An interleaved method for constructing de Bruijn sequences
- FINAL
- WAGE
- On the stability of \(m\)-sequences
- Improved transformation algorithms for generalized Galois NLFSRs
- Algebraic attacks on grain-like keystream generators
- New general framework for algebraic degree evaluation of NFSR-based cryptosystems
- Improving division property based cube attacks by removing invalid monomials
- On usage of cellular automata in strengthening stream ciphers
- Hardware optimizations of stream cipher Rabbit
- New cube distinguishers on NFSR-based stream ciphers
- Weightwise perfectly balanced functions with high weightwise nonlinearity profile
- Flaws in the initialisation process of stream ciphers
- The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited
- A generic method for investigating nonsingular Galois NFSRs
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- The MILP-aided conditional differential attack and its application to Trivium
- Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs
- Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR
- On black-box optimization in divide-and-conquer SAT solving
This page was built for software: Grain