[PDF][PDF] Cipher and hash function design strategies based on linear and differential cryptanalysis

J Daemen - 1995 - cs.ru.nl
This thesis contains a new approach to design block ciphers, synchronous and self-
synchronizing stream ciphers and cryptographic hash functions. The goal of this approach is …

Trivium

C De Canniere, B Preneel - New Stream Cipher Designs: The eSTREAM …, 2008 - Springer
In this chapter, we propose a new stream cipher construction based on block cipher design
principles. The main idea is to replace the building blocks used in block ciphers by …

Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles

C De Canniere - International Conference on Information Security, 2006 - Springer
In this paper, we propose a new stream cipher construction based on block cipher design
principles. The main idea is to replace the building blocks used in block ciphers by …

New approaches to the design of self-synchronizing stream ciphers

UM Maurer - Workshop on the Theory and Application of of …, 1991 - Springer
Self-synchronizing stream ciphers (SSSC) are a commonly used encryption technique for
channels with low bit error rate but for which bit synchronization can present a problem. Most …

Stream cipher designs: a review

L Jiao, Y Hao, D Feng - Science China Information Sciences, 2020 - Springer
Stream cipher is an important branch of symmetric cryptosystems, which takes obvious
advantages in speed and scale of hardware implementation. It is suitable for using in the …

[图书][B] Analysis and design of stream ciphers

RA Rueppel - 2012 - books.google.com
It is now a decade since the appearance of W. Diffie and ME Hellmann's startling paper,"
New Directions in Cryptography". This paper not only established the new field of public-key …

[图书][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …

WG: A family of stream ciphers with designed randomness properties

Y Nawaz, G Gong - Information Sciences, 2008 - Elsevier
In this paper we present a family of stream ciphers which generate a keystream with ideal
two-level autocorrelation. The design also guarantees other randomness properties, ie …

The MICKEY stream ciphers

S Babbage, M Dodd - New Stream Cipher Designs: The eSTREAM …, 2008 - Springer
The family of stream ciphers MICKEY (which stands for Mutual Irregular Clocking KEYstream
generator) is aimed at resource-constrained hardware platforms. It is intended to have low …

Resynchronization weaknesses in synchronous stream ciphers

J Daemen, R Govaerts, J Vandewalle - … '93: Workshop on the Theory and …, 1994 - Springer
In some applications for synchronous stream ciphers, the risk of loss of synchronization
cannot be eliminated completely. In these cases frequent synchronization or …