VLSI Architectures for Computing Multiplications and Inverses in GF(2m)
IEEE Transactions on Computers
Optimal normal bases in GF(pn)
Discrete Applied Mathematics
An Efficient Optimal Normal Basis Type II Multiplier
IEEE Transactions on Computers
A New Construction of Massey-Omura Parallel Multiplier over GF(2^{m})
IEEE Transactions on Computers
Efficient Software Implementation for Finite Field Multiplication in Normal Basis
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Fast Normal Basis Multiplication Using General Purpose Processors
IEEE Transactions on Computers
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
Efficient digit-serial normal basis multipliers over binary extension fields
ACM Transactions on Embedded Computing Systems (TECS)
Low Complexity Word-Level Sequential Normal Basis Multipliers
IEEE Transactions on Computers
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Resynchronization attacks on WG and LEX
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Binary pseudorandom sequences of period 2n-1 with ideal autocorrelation
IEEE Transactions on Information Theory
Cryptographic properties of the Welch-Gong transformation sequence generators
IEEE Transactions on Information Theory
New cyclic difference sets with Singer parameters
Finite Fields and Their Applications
Studies on the distribution of the shortest linear recurring sequences
Information Sciences: an International Journal
Cryptanalysis of WG-7: a lightweight stream cipher
Cryptography and Communications
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs
Proceedings of the Workshop on Embedded Systems Security
Resilience to distinguishing attacks on WG-7 cipher and their generalizations
Cryptography and Communications
Optimal parameters for the WG stream cipher family
Cryptography and Communications
Hi-index | 0.07 |
In this paper we present a family of stream ciphers which generate a keystream with ideal two-level autocorrelation. The design also guarantees other randomness properties, i.e., balance, long period, ideal tuple distribution, and high and exact linear complexity. We discuss how these properties are achieved by the proposed design and show how to select various parameters to obtain an efficient stream cipher for the desired security level. We also show that the proposed generators are secure against time/memory/data tradeoff attacks, algebraic attacks and correlation attacks. Finally we present WG-128 as a concrete example of a WG stream cipher with a key size of 128bits.