M ? gren, M Hell, T Johansson… - International Journal of …, 2011 - inderscienceonline.com
A new version of the stream cipher Grain-128 is proposed. The new version, Grain-128a, is strengthened against all known attacks and observations on the original Grain-128, and has …
I Dinur, A Shamir - Fast Software Encryption: 18th International Workshop …, 2011 - Springer
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new …
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement …
JP Aumasson, L Henzen, W Meier… - … and embedded systems, 2010 - Springer
The need for lightweight cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFID protocols. However not many designs …
L Ding, C Liu, Y Zhang, Q Ding - Symmetry, 2019 - mdpi.com
A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in …
In this paper we study a differential fault attack against the Grain family of stream ciphers. The attack works due to certain properties of the Boolean functions and corresponding …
In Fast Software Encryption (FSE) 2015, while presenting a new idea (ie, the design of stream ciphers with the small internal state by using a secret key, not only in the initialization …
AJ Van De Goor, I Schanstra - Proceedings First IEEE …, 2002 - ieeexplore.ieee.org
The way address sequences and data patterns appear on the outside of a memory may differ from their internal appearance; this effect is referred to as scrambling, which has a …
I Dinur, T Güneysu, C Paar, A Shamir… - Advances in Cryptology …, 2011 - Springer
In this paper we describe the first single-key attack which can recover the full key of the full version of Grain-128 for arbitrary keys by an algorithm which is significantly faster than …