A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
[chapter]
2006
Lecture Notes in Computer Science
In this paper, we propose a new stream cipher construction based on block cipher design principles. ...
The main idea is to replace the building blocks used in block ciphers by equivalent stream cipher components. ...
Basic Construction A well-known way to construct a key stream generator from a block cipher is to use the cipher in output feedback (OFB) mode. ...
doi:10.1007/11836810_13
fatcat:a5vxvxwqbngxxlv6qd3kqgganm
Quavium - A New Stream Cipher Inspired by Trivium
2012
Journal of Computers
This paper is concerned with an extensive form of stream cipher Trivium. Trivium is extended to a scalable form by the coupling connection of Trivium-like shift registers. ...
As the main contribution, a new stream cipher Quavium is proposed based on 4-round Trivium-like shift registers and k-order primitive polynomials. Quavium can also be used with 3 rounds. ...
The design of Trivium is inspired by the block cipher design principles [3] . S-box in a block cipher is substituted by a non-linear one-bit-output function. ...
doi:10.4304/jcp.7.5.1278-1283
fatcat:7jdlwa45effx5cz6smnhomxssa
Hard Fault Analysis of Trivium
[article]
2009
arXiv
pre-print
As a hardware-oriented stream cipher, Trivium is weak under soft fault analysis. ...
Fault analysis is a powerful attack to stream ciphers. Up to now, the major idea of fault analysis is to simplify the cipher system by injecting some soft faults. We call it soft fault analysis. ...
“Trivium: a stream cipher construction
inspired by block cipher design principle,” eSTREAM, ECRYPT Stream
Cipher Project, Report 2005/30 (2005), Available:
http://www.ecrypt.eu.org/stream
[ ...
arXiv:0907.2315v1
fatcat:vscvuvot6bhx5nne2thkcrm4ca
Trivium stream cipher countermeasures against fault injection attacks and DFA
2021
IEEE Access
De Cannière, ‘‘Trivium: A stream cipher construction inspired by
block cipher design principles,’’ in Proc. 9th ...
TRIVIUM STREAM CIPHER
determine whether the fault detection latency can be The Trivium stream cipher [7] is one of the finalists of the
exploited by the DFAs. ...
doi:10.1109/access.2021.3136609
fatcat:cvte57pfcva33an2exzai6zeky
Estimations of cryptographic resistance of ciphers in the trivium family to sat-based cryptanalysis
Оценки стойкости шифров семейства Trivium к криптоанализу на основе алгоритмов решения проблемы булевой выполнимости
2016
Prikladnaya diskretnaya matematika Prilozhenie
Оценки стойкости шифров семейства Trivium к криптоанализу на основе алгоритмов решения проблемы булевой выполнимости
Представлены результаты криптоанализа трёх поточных шифров семейства Trivium (Bivium, Trivium toy, Bivium toy). ...
В [8] введены в рассмотрение т. н. игрушечные версии шифров Trivium и Bivium соответственно Trivium toy и Bivium toy. ...
Trivium: A stream cipher construction inspired by block cipher design principles // LNCS. 2006. V. 4176. P. 171-186. 2. Maximov A. and Biryukov A. Two trivial attacks on Trivium // SAC'07. ...
doi:10.17223/2226308x/9/19
fatcat:xqvr24jckbgdfauzqn2qpz7pcm
A Survey on Stream Ciphers for Constrained Environments
2021
Zenodo
A stream cipher is faster and less complex than block ciphers so it is suitable with the Internet of Things (IoT). ...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and block ciphers. ...
X-Lizard The Lizard's design was inspired by the stream ciphers Grain family. Lizard's internal state is spread over two interconnected feedback shift registers (FSRs). ...
doi:10.5281/zenodo.5732804
fatcat:5izov35nwzbrzp6nkjgftvqzpy
Stream cipher designs: a review
2020
Science China Information Sciences
Block cipher based stream cipher Many stream ciphers are proposed with the design idea of block ciphers, such as based on the basic operation, round function or algorithm structure of a block cipher, even ...
According to the different design methods, we analyzed their advantages and shortages in order to inspire the further research in stream cipher designs. ...
doi:10.1007/s11432-018-9929-x
fatcat:owggwpyki5dydekbh6dg7zvofm
A2U2: A stream cipher for printed electronics RFID tags
2011
2011 IEEE International Conference on RFID
In this paper we present a new stream cipher, A2U2, which uses principles of stream cipher design and approaches from block cipher design. ...
, with the added benefit of high throughput provided by stream ciphers. ...
Nevertheless, there is a large body of established guidelines and design principles for building stream ciphers such as those elaborated by Rueppel [10] . ...
doi:10.1109/rfid.2011.5764619
fatcat:azj4iwexv5ck3hbk44ursxit6i
On Lightweight Stream Ciphers with Shorter Internal States
[chapter]
2015
Lecture Notes in Computer Science
We demonstrate the feasibility of this approach by describing and implementing a concrete stream cipher Sprout which uses significantly less area than comparable existing lightweight stream ciphers. ...
We argue that a simple shift in the established design paradigm, namely to involve the fixed secret key not only in the initialization process but in the keystream generation phase as well, enables stream ...
Stream ciphers usually allow for a higher throughput but require a larger area size compared to block ciphers. ...
doi:10.1007/978-3-662-48116-5_22
fatcat:eb3552jupveb7iakcdabt4zpea
LIZARD – A Lightweight Stream Cipher for Power-constrained Devices
2017
IACR Transactions on Symmetric Cryptology
Its hardware efficiency results from combining a Grain-like design with the FP(1)-mode, a recently suggested construction principle for the state initialization of stream ciphers, which offers provable ...
In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags. ...
Test vectors can be found in appendix A.
Design Specification The design of Lizard is similar to (and was in fact inspired by) that of the Grain family [HJMM08] of stream ciphers. ...
doi:10.46586/tosc.v2017.i1.45-79
fatcat:aap4zegsgvfbhe5ly76inmpkrm
LIZARD – A Lightweight Stream Cipher for Power-constrained Devices
2017
IACR Transactions on Symmetric Cryptology
Its hardware efficiency results from combining a Grain-like design with the FP(1)-mode, a recently suggested construction principle for the state initialization of stream ciphers, which offers provable ...
In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags. ...
Test vectors can be found in appendix A.
Design Specification The design of Lizard is similar to (and was in fact inspired by) that of the Grain family [HJMM08] of stream ciphers. ...
doi:10.13154/tosc.v2017.i1.45-79
dblp:journals/tosc/HamannKM17
fatcat:yy3mitkbqfftlbhxdbw7nupkzu
Quark: A Lightweight Hash
2012
Journal of Cryptology
Inspired by the lightweight ciphers Grain and KATAN, we present the hash function family Quark, composed of the three instances u-Quark, d-Quark, and t-Quark. ...
In this paper, we thus propose a novel design philosophy for lightweight hash functions, based on a single security level and on the sponge construction, to minimize memory requirements. ...
The block cipher family KATAN [18] (CHES 2009) is inspired by the stream cipher Trivium [19] and builds a keyed permutation with two NFSR's combined with two light quadratic Boolean functions. ...
doi:10.1007/s00145-012-9125-6
fatcat:xdi7vyyuufclhjxdx7uooq6v5q
Quark: A Lightweight Hash
[chapter]
2010
Lecture Notes in Computer Science
Inspired by the lightweight ciphers Grain and KATAN, we present the hash function family Quark, composed of the three instances u-Quark, d-Quark, and t-Quark. ...
In this paper, we thus propose a novel design philosophy for lightweight hash functions, based on a single security level and on the sponge construction, to minimize memory requirements. ...
The block cipher family KATAN [18] (CHES 2009) is inspired by the stream cipher Trivium [19] and builds a keyed permutation with two NFSR's combined with two light quadratic Boolean functions. ...
doi:10.1007/978-3-642-15031-9_1
fatcat:yut4cixcmbabbj7xesf2x2szci
On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
2018
Cryptography and Communications
The Lizard-construction proposes a state initialization algorithm for stream ciphers working in packet mode (like the GSM cipher A5/1 or the Bluetooth cipher E0). ...
This implies that practical stream ciphers have to have a comparatively large inner state length (e.g., n = 288 bit for Trivium [6] and n = 160 bit for Grain v1 [16] ). ...
Trivium [6] and Grain [16] can be considered examples of stream ciphers designed for one-stream mode due to their extremely large limits (e.g., 2 64 bits for Trivium) on the amount of keystream generated ...
doi:10.1007/s12095-018-0294-5
fatcat:utew6dnihrhfrbdhk6b7g6supi
Fault-based attacks on cryptographic hardware
2013
2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)
They circumvent the protection by inducing faults into the hardware implementation of cryptographic functions, thus affecting encryption and/or decryption in a controlled way. ...
Fault-based attacks are a relatively new threat to system integrity. ...
Block ciphers process chunks of data with a well-defined length (e.g., 128 bits), whereas stream ciphers process data continuously bit-by-bit. ...
doi:10.1109/ddecs.2013.6549781
dblp:conf/ddecs/PolianK13
fatcat:463ms2z3draxdkuox4i72ib7fi
« Previous
Showing results 1 — 15 out of 41 results