[BOOK][B] RC4 stream cipher and its variants

G Paul, S Maitra - 2011 - books.google.com
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software
stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 …

Analysis of Grain's initialization algorithm

C De Canniere, Ö Kücük, B Preneel - International Conference on …, 2008 - Springer
In this paper, we analyze the initialization algorithm of Grain, one of the eSTREAM
candidates which made it to the third phase of the project. We point out the existence of a …

Image encryption framework based on multi-chaotic maps and equal pixel values quantization

H Kolivand, SF Hamood, S Asadianfam… - Multimedia Tools and …, 2024 - Springer
The importance of image encryption has considerably increased, especially after the
dramatic evolution of the internet and network communications, due to the simplicity of …

Differential attacks against stream cipher ZUC

H Wu, T Huang, PH Nguyen, H Wang… - … Conference on the Theory …, 2012 - Springer
Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity
algorithms 128-EEA3 and 128-EIA3. In this paper, we present the details of our differential …

Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps

JS Teh, A Abba - Journal of Informatics and Web Engineering, 2024 - mmupress.com
Chaos-based cryptography has yet to achieve practical, real-world applications despite
extensive research. A major challenge is the difficulty in analysing the security of these …

[PDF][PDF] Cryptanalysis and design of stream ciphers

B Preneel, H Wu - PhD diss., PhD thesis, Katholieke Universiteit …, 2008 - personal.ntu.edu.sg
This thesis presents some novel results on the cryptanalysis and design of stream ciphers.
The first part of the thesis introduces various stream ciphers design and cryptanalysis …

Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32

M Joseph, G Sekar… - The Computer Journal, 2024 - academic.oup.com
The synchronous stream ciphers RCR-64 and RCR-32 designed by Sekar, Paul and
Preneel are strengthened variants of the ciphers TPy and TPypy (designed by Biham and …

A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.

S Dey, R Ghosh - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …

Attacking Trivium at the bitstream level

K Ngo, E Dubrova, M Moraitis - 2020 IEEE 38th International …, 2020 - ieeexplore.ieee.org
In this paper, we present a bitstream modification attack on the Trivium stream cipher, an
international standard under ISO/IEC 29192-3. By changing the content of three LUTs in the …

Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses

G Sekar, S Paul, B Preneel - International Conference on Cryptology in …, 2007 - Springer
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the
strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy …