On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
暂无分享,去创建一个
[1] Stefano Tessaro,et al. Secret-key cryptography from ideal primitives: A systematic overview , 2015, 2015 IEEE Information Theory Workshop (ITW).
[2] Vahid Aminghafari,et al. Fruit: ultra-lightweight stream cipher with shorter internal state , 2016, IACR Cryptol. ePrint Arch..
[3] Adi Shamir,et al. Minimalism in Cryptography: The Even-Mansour Scheme Revisited , 2012, EUROCRYPT.
[4] Frederik Armknecht,et al. Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts , 2014, RFIDSec.
[5] Bin Zhang,et al. Another Tradeoff Attack on Sprout-Like Stream Ciphers , 2015, ASIACRYPT.
[6] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[7] Sugata Gangopadhyay,et al. A TMDTO Attack Against Lizard , 2018, IEEE Transactions on Computers.
[8] Henri Gilbert,et al. On the Security of IV Dependent Stream Ciphers , 2007, FSE.
[9] S. Babbage. Improved “exhaustive search” attacks on stream ciphers , 1995 .
[10] Frederik Armknecht,et al. On Ciphers that Continuously Access the Non-Volatile Key , 2017, IACR Trans. Symmetric Cryptol..
[11] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[12] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[13] Yishay Mansour,et al. A construction of a cipher from a single pseudorandom permutation , 1997, Journal of Cryptology.
[14] Santanu Sarkar,et al. Differential Fault Attack on Grain v1, ACORN v3 and Lizard , 2017, IACR Cryptol. ePrint Arch..
[15] Willi Meier,et al. The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption , 2005, CRYPTO.
[16] Orr Dunkelman,et al. Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers , 2008, Inf. Process. Lett..
[17] John P. Steinberger,et al. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations , 2012, IACR Cryptol. ePrint Arch..
[18] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[19] Orhun Kara,et al. Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks , 2015, SAC.
[20] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[21] Takanori Isobe,et al. Some cryptanalytic results on Lizard , 2017, IACR Cryptol. ePrint Arch..
[22] Martin Hell,et al. The Grain Family of Stream Ciphers , 2008, The eSTREAM Finalists.
[23] María Naya-Plasencia,et al. Cryptanalysis of Full Sprout , 2015, Annual International Cryptology Conference.
[24] Frederik Armknecht,et al. On Lightweight Stream Ciphers with Shorter Internal States , 2015, FSE.
[25] Stefano Tessaro,et al. Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security , 2016, CRYPTO.
[26] Matthias Krause,et al. Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks , 2015, IACR Cryptol. ePrint Arch..
[27] Bin Zhang,et al. Design and analysis of small-state grain-like stream ciphers , 2017, Cryptography and Communications.
[28] Willi Meier,et al. LIZARD - A Lightweight Stream Cipher for Power-constrained Devices , 2017, IACR Trans. Symmetric Cryptol..
[29] Yishay Mansour,et al. A Construction of a Cioher From a Single Pseudorandom Permutation , 1991, ASIACRYPT.
[30] Subhadeep Banik,et al. Some Results on Sprout , 2015, INDOCRYPT.
[31] John P. Steinberger,et al. Tight Security Bounds for Key-Alternating Ciphers , 2014, EUROCRYPT.
[32] John P. Steinberger,et al. On the Indifferentiability of Key-Alternating Ciphers , 2013, IACR Cryptol. ePrint Arch..
[33] John P. Steinberger,et al. Minimizing the Two-Round Even–Mansour Cipher , 2014, Journal of Cryptology.