Observing biases in the state: case studies with Trivium and Trivia-SC
暂无分享,去创建一个
[1] Fabio Massacci,et al. Using Walk-SAT and Rel-Sat for Cryptographic Key Search , 1999, IJCAI.
[2] Bart Preneel,et al. Analysis of Grain's Initialization Algorithm , 2008, AFRICACRYPT.
[3] Alex Biryukov,et al. Slid Pairs in Salsa20 and Trivium , 2008, INDOCRYPT.
[4] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[5] Zsolt Kukorelly. The Piling-Up Lemma and Dependent Random Variables , 1999, IMACC.
[6] Mahmoud Salmasizadeh,et al. Superpoly algebraic normal form monomial test on Trivium , 2013, IET Inf. Secur..
[7] Alex Biryukov,et al. Slide Attacks , 1999, FSE.
[8] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[9] Avik Chakraborti,et al. TriviA: A Fast and Secure Authenticated Encryption Scheme , 2015, CHES.
[10] Santanu Sarkar,et al. Some observations on ACORN v 1 and Trivia-SC , 2015 .
[11] Kenneth G. Paterson,et al. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) , 2014, ASIACRYPT.
[12] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[13] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.
[14] Peter Shiu,et al. Cryptography: Theory and practice (3rd edn), by Douglas R. Stinson. Pp. 593. 2006. (hbk) £39.99. ISBN 1 58488 508 4 (Chapman and Hall / CRC). , 2007, The Mathematical Gazette.
[15] Pierre-Alain Fouque,et al. Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks , 2013, IACR Cryptol. ePrint Arch..
[16] Seokhie Hong,et al. Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 , 2008, ACISP.
[17] Alex Biryukov,et al. Two Trivial Attacks on Trivium , 2007, IACR Cryptol. ePrint Arch..
[18] Alex Biryukov,et al. Advanced Slide Attacks , 2000, EUROCRYPT.
[19] Santanu Sarkar,et al. A Chosen IV Related Key Attack on Grain-128a , 2013, ACISP.
[20] Willi Meier,et al. Conditional Differential Cryptanalysis of Trivium and KATAN , 2011, Selected Areas in Cryptography.
[21] Dongdai Lin,et al. Searching cubes for testing Boolean functions and its application to Trivium , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[22] Gregory V. Bard,et al. Algebraic and Slide Attacks on KeeLoq , 2008, FSE.
[23] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[24] Bin Zhang,et al. Linear Cryptanalysis of FASER128/256 and TriviA-ck , 2014, INDOCRYPT.
[25] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[26] Eli Biham,et al. Improved Slide Attacks , 2007, FSE.
[27] Santanu Sarkar,et al. New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers , 2015, IACR Cryptol. ePrint Arch..
[28] Paul Stankovski,et al. Greedy Distinguishers and Nonrandomness Detectors , 2010, INDOCRYPT.