A generalized birthday problem
D Wagner - Annual International Cryptology Conference, 2002 - Springer
We study ak-dimensional generalization of the birthday problem: given k lists of n-bit values,
find some way to choose one element from each list so that the resulting k values xor to zero …
find some way to choose one element from each list so that the resulting k values xor to zero …
Grain-128a: a new version of Grain-128 with optional authentication
A new version of the stream cipher Grain-128 is proposed. The new version, Grain-128a, is
strengthened against all known attacks and observations on the original Grain-128, and has …
strengthened against all known attacks and observations on the original Grain-128, and has …
A stream cipher proposal: Grain-128
A new stream cipher, Grain-128, is proposed. The design is very small in hardware and it
targets environments with very limited resources in gate count, power consumption, and chip …
targets environments with very limited resources in gate count, power consumption, and chip …
A new SNOW stream cipher called SNOW-V
In this paper we are proposing a new member in the SNOW family of stream ciphers, called
SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a …
SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a …
Fast correlation attacks: An algorithmic point of view
P Chose, A Joux, M Mitton - … 2002: International Conference on the Theory …, 2002 - Springer
In this paper, we present some major algorithmic improvements to fast correlation attacks. In
previous articles about fast correlations, algorithmics never was the main topic. Instead, the …
previous articles about fast correlations, algorithmics never was the main topic. Instead, the …
[PDF][PDF] SNOW-a new stream cipher
In this paper a new word-oriented stream cipher, called SNOW, is proposed. The design of
the cipher is quite simple, consisting of a linear feedback shift register, feeding a finite state …
the cipher is quite simple, consisting of a linear feedback shift register, feeding a finite state …
The stream cipher HC-128
H Wu - New Stream Cipher Designs: The eSTREAM Finalists, 2008 - Springer
The Stream Cipher HC-128 Page 1 The Stream Cipher HC-128 Hongjun Wu Katholieke
Universiteit Leuven, ESAT/SCD-COSIC and IBBT Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee …
Universiteit Leuven, ESAT/SCD-COSIC and IBBT Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee …
Fast correlation attacks through reconstruction of linear polynomials
The task of a fast correlation attack is to efficiently restore the initial content of a linear
feedback shift register in a stream cipher using a detected correlation with the output …
feedback shift register in a stream cipher using a detected correlation with the output …
[KNYGA][B] Stream ciphers
A Klein - 2013 - Springer
Cryptographic ciphers come in two flavours: symmetric (AES, etc.) and asymmetric (RSA,
etc.). The symmetric ciphers are further divided into block ciphers and stream ciphers. Block …
etc.). The symmetric ciphers are further divided into block ciphers and stream ciphers. Block …
Block ciphers and stream ciphers: The state of the art
A Biryukov - Cryptology EPrint Archive, 2004 - eprint.iacr.org
In these lecture notes we survey the state of the art in symmetric key encryption, in particular
in the block ciphers and stream ciphers area. The area of symmetric key encryption has …
in the block ciphers and stream ciphers area. The area of symmetric key encryption has …