×

Found 40 Documents (Results 1–40)

From unbalanced to perfect: implementation of low energy stream ciphers. (English) Zbl 07798835

El Mrabet, Nadia (ed.) et al., Progress in cryptology – AFRICACRYPT 2023. 14th international conference on cryptology in Africa, Sousse, Tunisia, July 19–21, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14064, 204-226 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Higher-order masking scheme for Trivium hardware implementation. (English) Zbl 07730529

Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 337-356 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Stretching cube attacks: improved methods to recover massive superpolies. (English) Zbl 1519.94132

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 537-566 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced round SPEEDY. (English) Zbl 1515.94088

Batina, Lejla (ed.) et al., Progress in cryptology – AFRICACRYPT 2022. 13th international conference on cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13503, 133-149 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Massive superpoly recovery with nested monomial predictions. (English) Zbl 1514.94101

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 392-421 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A practical key-recovery attack on 805-round Trivium. (English) Zbl 1514.94142

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 187-213 (2021).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Isomorphism and equivalence of Galois nonlinear feedback shift registers. (English) Zbl 1492.94133

Yu, Yu (ed.) et al., Information security and cryptology. 17th international conference, Inscrypt 2021, virtual event, August 12–14, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13007, 301-315 (2021).
MSC:  94A60 94A55 94D10
PDFBibTeX XMLCite
Full Text: DOI

Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles. (English) Zbl 1479.94259

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 453-465 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums. (English) Zbl 1511.94112

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 446-476 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes. (English) Zbl 1447.94052

Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 92-114 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Correlation cube attacks: from weak-key distinguisher to key recovery. (English) Zbl 1428.94086

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 715-744 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. (English) Zbl 1387.94071

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 313-333 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity. (English) Zbl 1404.94035

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 191-219 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

LHash: a lightweight hash function. (English) Zbl 1347.94062

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 291-308 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ALE: AES-based lightweight authenticated encryption. (English) Zbl 1321.94042

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 447-466 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved multi-bit differential fault analysis of Trivium. (English) Zbl 1344.94044

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 37-52 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An equivalence-preserving transformation of shift registers. (English) Zbl 1337.94013

Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 187-199 (2014).
MSC:  94A55
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software