A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures
2019
Cryptography
The proposed sample cipher-structure is based on non-linear merging of randomly selected 16 Nonlinear Feedback Shift Registers (NLFSRs). ...
A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs. ...
To make a usable comparison with the state-of-the-art stream ciphers, the hardware complexity of the proposed family of stream ciphers is compared with all profile-2 eSTREAM finalists: Grain v1 [32] , ...
doi:10.3390/cryptography3020011
fatcat:rcnfqj57c5gzpgjjyairdz4kaa
Fault Attacks In Symmetric Key Cryptosystems
[article]
2020
IACR Cryptology ePrint Archive
and going to stay as an active research interest for a foreseeable future. ...
Fault attacks work by forcing a device to work under non-ideal environmental conditions (such as high temperature) or external disturbances (such as glitch in the power supply) while performing a cryptographic ...
It may be noted that AFA is particularly useful against stream ciphers and stream cipher based designs; as it is relatively straightforward to get the algebraic equations in the computer rather than manually ...
dblp:journals/iacr/BaksiBBJS20
fatcat:dln4jkk6mvb33okcmlwrkkjm54
Links between Division Property and Other Cube Attack Variants
2020
IACR Transactions on Symmetric Cryptology
Secondly, now that the bias phenomenon can be efficiently and elaborately evaluated, we further derive new secure bounds for Grain-like primitives (namely Grain-128, Grain-128a, Grain-V1, Plantlet) against ...
This is an efficient tool for newly designed stream ciphers for determining the number of initialization rounds. Thirdly, we improve Wang et al.' ...
There are also other applications namely: drawing secure bounds for Grain-like stream ciphers against bias cube testers, and improved cube attack results on Kreyvium and Acorn. ...
doi:10.13154/tosc.v2020.i1.363-395
dblp:journals/tosc/HaoJLMTW20
fatcat:2whx4nizzrfurfweptdcsmqokm
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
[chapter]
2018
Lecture Notes in Computer Science
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especially for stream ciphers. ...
To be specific, our key recovery attacks have mounted to 839-round Trivium, 891-round Kreyvium, 184-round Grain-128a and 750-round Acorn respectively. ...
We would like to thank Christian Rechberger, Elmar Tischhauser, Lorenzo Grassi and Liang Zhong for their fruitful discussions, and the anonymous reviewers for their valuable comments. ...
doi:10.1007/978-3-319-96884-1_10
fatcat:gmktfhmzkrhe3lkcrqc42mijy4