Energy, performance, area versus security trade-offs for stream ciphers

SASC - The State of the Art of Stream Ciphers, October 14-15, Brugge, Belgium : Special Workshop hosted by the ECRYPT Network of Excellence

[1]  M. Hamid,et al.  A note to low-power linear feedback shift registers , 1998 .

[2]  Franco Fummi,et al.  Power characterization of LFSRs , 1999, Proceedings 1999 IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (EFT'99).

[3]  O. Koufopavlou,et al.  Hardware implementation of the RC4 stream cipher , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[4]  Adi Shamir,et al.  Guaranteeing the Diversity of Number Generators , 2001, Inf. Comput..

[5]  Odysseas G. Koufopavlou,et al.  Hardware Implementation of Bluetooth Security , 2003, IEEE Pervasive Comput..

[6]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[7]  Vincent Rijmen,et al.  Recent Developments in the Design of Conventional Cryptographic Algorithms , 1997, State of the Art in Applied Cryptography.

[8]  Frederik Armknecht,et al.  Extending the Resynchronization Attack (extended version) , 2004 .

[9]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[10]  Adi Shamir,et al.  New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.

[11]  Paris Kitsos,et al.  A reconfigurable linear feedback shift register (LFSR) for the Bluetooth system , 2001, ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.01EX483).

[12]  Joos Vandewalle,et al.  Resynchronization Weaknesses in Synchronous Stream Ciphers , 1994, EUROCRYPT.