A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
An improved correlation attack on a5/1
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
On analysis and synthesis of (n, k)-non-linear feedback shift registers
Proceedings of the conference on Design, automation and test in Europe
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
KATAN and KTANTAN -- A Family of Small and Efficient Hardware-Oriented Block Ciphers
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
SPONGENT: a lightweight hash function
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Cryptanalysis of the stream cipher BEAN
Proceedings of the 4th international conference on Security of information and networks
Grain-128a: a new version of Grain-128 with optional authentication
International Journal of Wireless and Mobile Computing
On the stability of m-sequences
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Protocol for ownership transfer across authorities: with the ability to assign transfer target
Security and Communication Networks
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Analysis of indirect message injection for MAC generation using stream ciphers
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
High order differential attacks on stream ciphers
Cryptography and Communications
Cryptanalysis of TWIS block cipher
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
Towards secure fieldbus communication
SAFECOMP'12 Proceedings of the 31st international conference on Computer Safety, Reliability, and Security
PRINCE: a low-latency block cipher for pervasive computing applications
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
On the implementation aspects of sponge-based authenticated encryption for pervasive devices
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Slid pairs in the initialisation of the A5/1 stream cipher
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs
Proceedings of the Workshop on Embedded Systems Security
Block ciphers that are easier to mask: how far can we go?
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications
Hi-index | 0.00 |
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on two shift registers and a non-linear output function. The cipher has the additional feature that the speed can be increased at the expense of extra hardware. The key size is 80 bits and no attack faster than exhaustive key search has been identified. The hardware complexity and throughput compares favourably to other hardware oriented stream ciphers like E0 and A5/1.