The Design of Rijndael
Fast Hashing and Stream Encryption with PANAMA
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Algebraic immunity of S-boxes and augmented functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Lightweight cryptography and RFID: tackling the hidden overheads
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
An algorithm for constructing a fastest Galois NLFSR generating a given sequence
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
A new framework for RFID privacy
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Gemstone: a new stream cipher using coupled map lattice
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
SPONGENT: a lightweight hash function
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Piccolo: an ultra-lightweight blockcipher
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Grain-128a: a new version of Grain-128 with optional authentication
International Journal of Wireless and Mobile Computing
On the security of NOEKEON against side channel cube attacks
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
An architectural countermeasure against power analysis attacks for FSR-Based stream ciphers
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Low-latency encryption: is "Lightweight = light + wait"?
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Searching short recurrences of nonlinear shift registers via directed acyclic graphs
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Differential attacks against stream cipher ZUC
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
An improved hardware implementation of the grain-128a stream cipher
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Block ciphers that are easier to mask: how far can we go?
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
On the largest affine sub-families of a family of NFSR sequences
Designs, Codes and Cryptography
A zero-knowledge based framework for RFID privacy
Journal of Computer Security - ESORICS 2010
Hi-index | 0.00 |
In this chapter, we propose a new stream cipher construction based on block cipher design principles. The main idea is to replace the building blocks used in block ciphers by equivalent stream cipher components. In order to illustrate this approach, we construct a very simple synchronous stream cipher which provides a lot of flexibility for hardware implementations, and seems to have a number of desirable cryptographic properties.