The Poly1305-AES message-authentication code
DJ Bernstein - International workshop on fast software encryption, 2005 - Springer
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety
of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length …
of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length …
Scan-based attacks on linear feedback shift register based stream ciphers
Stream cipher is an important class of encryption algorithm that encrypts plaintext messages
one bit at a time. Various stream ciphers are deployed in wireless telecommunication …
one bit at a time. Various stream ciphers are deployed in wireless telecommunication …
A new approach for FCSRs
F Arnault, T Berger, C Lauradoux, M Minier… - Selected Areas in …, 2009 - Springer
Abstract The Feedback with Carry Shift Registers (FCSRs) have been proposed as an
alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers …
alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers …
Cryptanalysis of SFINKS
NT Courtois - International Conference on Information Security and …, 2005 - Springer
Sfinks is an LFSR-based stream cipher submitted to ECRYPT call for stream ciphers by
Braeken, Lano, Preneel et al. The designers of Sfinks do not include any real protection …
Braeken, Lano, Preneel et al. The designers of Sfinks do not include any real protection …
Method for securely extending key stream to encrypt high-entropy data
GG Rose, PM Hawkes - US Patent 8,213,607, 2012 - Google Patents
A stream stretcher is provided for securely expanding a key stream to match the length of a
data block to be encrypted and/or decrypted. A key stream is obtained having a length of LZ …
data block to be encrypted and/or decrypted. A key stream is obtained having a length of LZ …
Contact-less integrity verification of microelectronics using near-field EM analysis
Modern microelectronics life-cycle and supply chain ecosystem bring multiple untrusted
entities, which can compromise their integrity. A major integrity issue of microelectronics …
entities, which can compromise their integrity. A major integrity issue of microelectronics …
Unbiased random sequences from quasigroup string transformations
The need of true random number generators for many purposes (ranging from applications
in cryptography and stochastic simulation, to search heuristics and game playing) is …
in cryptography and stochastic simulation, to search heuristics and game playing) is …
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V
Z Zhou, D Feng, B Zhang - Designs, Codes and Cryptography, 2022 - Springer
SNOW-V is a stream cipher recently designed for the 5G communication systems. This
paper proposes two efficient algorithms to evaluate precise correlations of SNOW-V's two …
paper proposes two efficient algorithms to evaluate precise correlations of SNOW-V's two …
Attacks in stream ciphers: a survey
G Banegas - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Nowadays there are different types of attacks in block and stream ciphers. In this work we
will present some of the most used attacks on stream ciphers. We will present the newest …
will present some of the most used attacks on stream ciphers. We will present the newest …
**pong-128, a new stream cipher for ubiquitous application
HJ Lee, K Chen - 2007 International Conference on …, 2007 - ieeexplore.ieee.org
The **Pong family of keystream generator is based on the LM-type summation generator.
A mutual-clock-control mechanism is added to the LM-type summation generator to provide …
A mutual-clock-control mechanism is added to the LM-type summation generator to provide …