[BOOK][B] RC4 stream cipher and its variants
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software
stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 …
stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 …
Analysis of Grain's initialization algorithm
C De Canniere, Ö Kücük, B Preneel - International Conference on …, 2008 - Springer
In this paper, we analyze the initialization algorithm of Grain, one of the eSTREAM
candidates which made it to the third phase of the project. We point out the existence of a …
candidates which made it to the third phase of the project. We point out the existence of a …
Image encryption framework based on multi-chaotic maps and equal pixel values quantization
The importance of image encryption has considerably increased, especially after the
dramatic evolution of the internet and network communications, due to the simplicity of …
dramatic evolution of the internet and network communications, due to the simplicity of …
Differential attacks against stream cipher ZUC
Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity
algorithms 128-EEA3 and 128-EIA3. In this paper, we present the details of our differential …
algorithms 128-EEA3 and 128-EIA3. In this paper, we present the details of our differential …
Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps
Chaos-based cryptography has yet to achieve practical, real-world applications despite
extensive research. A major challenge is the difficulty in analysing the security of these …
extensive research. A major challenge is the difficulty in analysing the security of these …
[PDF][PDF] Cryptanalysis and design of stream ciphers
This thesis presents some novel results on the cryptanalysis and design of stream ciphers.
The first part of the thesis introduces various stream ciphers design and cryptanalysis …
The first part of the thesis introduces various stream ciphers design and cryptanalysis …
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32
M Joseph, G Sekar… - The Computer Journal, 2024 - academic.oup.com
The synchronous stream ciphers RCR-64 and RCR-32 designed by Sekar, Paul and
Preneel are strengthened variants of the ciphers TPy and TPypy (designed by Biham and …
Preneel are strengthened variants of the ciphers TPy and TPypy (designed by Biham and …
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
S Dey, R Ghosh - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …
Attacking Trivium at the bitstream level
In this paper, we present a bitstream modification attack on the Trivium stream cipher, an
international standard under ISO/IEC 29192-3. By changing the content of three LUTs in the …
international standard under ISO/IEC 29192-3. By changing the content of three LUTs in the …
Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the
strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy …
strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy …