Analysis and design of stream ciphers
Analysis and design of stream ciphers
A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases
Information and Computation
Lower bounds on the weight complexities of cascaded binary sequences
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Resynchronization weaknesses in synchronous stream ciphers
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Finite fields
A Fast Algorithm for Multiplicative Inversion in GF(2m) Using Normal Basis
IEEE Transactions on Computers
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Primitive Polynomials over GF(2) - A Cryptologic Approach
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Parallel Itoh---Tsujii multiplicative inversion algorithm for a special class of trinomials
Designs, Codes and Cryptography
An extension of TYT inversion algorithm in polynomial basis
Information Processing Letters
Upper bounds on algebraic immunity of boolean power functions
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Finite Fields and Their Applications
Hi-index | 0.00 |
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ciphers are preferred in many applications, since they can destroy statistical properties of natural languages to some extent. However, it seems hard to design a stream cipher with many proven security properties. The objective of this paper is to present a binary stream cipher which is secure with respect to a number of attacks, and has reasonable performance. The advantage of the stream cipher over existing ones is that it has more proven security properties.