×

Related key chosen IV attacks on Decim v2 and Decim-128. (English) Zbl 1245.94081

MSC:

94A60 Cryptography
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, Decim: A new stream cipher for hardware applications, ECRYPT Stream Cipher Project Report 2005/004, Available at http://www.ecrypt.eu.org/stream/; C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, Decim: A new stream cipher for hardware applications, ECRYPT Stream Cipher Project Report 2005/004, Available at http://www.ecrypt.eu.org/stream/
[2] ECRYPT Stream Cipher Project, Available at http://www.ecrypt.eu.org/stream/; ECRYPT Stream Cipher Project, Available at http://www.ecrypt.eu.org/stream/
[3] Coppersmith, D.; Krawczyk, H.; Mansour, Y., The shrinking generator, (Advances in Cryptology -CRYPTO’93. Advances in Cryptology -CRYPTO’93, Lecture Notes in Computer Science, vol. 773 (1993), Springer-Verlag), 22-39 · Zbl 0871.94018
[4] Meier, W.; Staffelbach, O., The self-shrinking generator, (Advances in Cryptology-EUROCRYPT’94. Advances in Cryptology-EUROCRYPT’94, Lecture Notes in Computer Science, vol. 950 (1994), Springer-Verlag), 205-214 · Zbl 0881.94009
[5] Wu, Hongjun; Preneel, Bart, Cryptanalysis of stream cipher decim, (Fast Software Encryption, FSE 2006. Fast Software Encryption, FSE 2006, Lecture Notes in Computer Science. (2006), Springer-Verlag), Available at http://www.ecrypt.eu.org/stream/ · Zbl 1234.68097
[6] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, DECIM v2, ECRYPT Stream Cipher Project Report 2006/004, Available at http://www.ecrypt.eu.org/stream/; C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, DECIM v2, ECRYPT Stream Cipher Project Report 2006/004, Available at http://www.ecrypt.eu.org/stream/
[7] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, DECIM-128, ECRYPT Stream Cipher Project Report 2006/004, Available at http://www.ecrypt.eu.org/stream/; C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, DECIM-128, ECRYPT Stream Cipher Project Report 2006/004, Available at http://www.ecrypt.eu.org/stream/
[8] Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii, A Chosen IV Attack Using Phase Shifting Equivalent Keys against Decim v2, Cryptology ePrint Achieve; Report 2008/128,2008. http://eprint.iacr.org/; Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii, A Chosen IV Attack Using Phase Shifting Equivalent Keys against Decim v2, Cryptology ePrint Achieve; Report 2008/128,2008. http://eprint.iacr.org/
[9] Bin, Zhang, New cryptanalysis of irregularly decimated stream ciphers, (Selected Areas in Cryptography, SAC 2005. Selected Areas in Cryptography, SAC 2005, Lecture Notes in Computer Science, vol. 5867 (2009), Springer-Verlag), 449-465 · Zbl 1267.94106
[10] H. Nakagami, R. Teramura, M. Morii, On the security of the compression function ABSG on DECIM v2, in: Proc. Computer Security Symposium 2008, CSS2008, 2008 (in Japanese).; H. Nakagami, R. Teramura, M. Morii, On the security of the compression function ABSG on DECIM v2, in: Proc. Computer Security Symposium 2008, CSS2008, 2008 (in Japanese).
[11] Loe, C. W.; Khoo, K., Side channel attacks on irregularly decimated generators, (Proc. ICISC 2007. Proc. ICISC 2007, Lecture Note in Computer Science, vol. 4817 (2007)), 116-130 · Zbl 1337.94053
[12] Lee, Yuseop; Jeong, Kitae; Sung, Jaechul; Hong, Seokhie, (Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. ACISP 2008. Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. ACISP 2008, LNCS, vol. 5107 (2008)), 321-335 · Zbl 1285.94076
[13] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, Erratum to Decim-128, ECRYPT Stream Cipher Project, Available at http://www.ecrypt.eu.org/stream/; C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, Erratum to Decim-128, ECRYPT Stream Cipher Project, Available at http://www.ecrypt.eu.org/stream/
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.