نتایج جستجو برای: zaringol stream

تعداد نتایج: 57939  

Journal: :ISRN Signal Processing 2011

Journal: :IACR transaction on symmetric cryptology 2022

Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level half of cipher’s internal state size. The conventional way handle this vulnerability is design cipher with an twice as large desired level. In lightweight cryptography and heavily resource constrained devices, a size big drawback for cipher. This principle can be found in eSTREAM ...

Journal: :J. Funct. Program. 1992
Manfred Broy Claus Dendorfer

Some extensions of the basic formalism of stream processing functions are useful to specify complex structures such as operating systems In this paper we give the foundations of higher order stream process ing functions These are functions which send and accept not only messages representing atomic data but also complex elements such as functions Some special notations are introduced for the sp...

Journal: :IACR Cryptology ePrint Archive 2001
Steve Babbage

A new family of very fast stream ciphers called COS (for “crossing over system”) has been proposed by Filiol and Fontaine, and seems to have been adopted for at least one commercial standard. In this note we show that the COS ciphers are very weak indeed — it requires negligible effort to reconstruct the state of the keystream generator from a very small amount of known keystream.

Journal: :IACR Cryptology ePrint Archive 2003
Boris Pogorelov Marina Pudovkina

Stream ciphers are often used in applications where high speed and low delay are a requirement. The Solitaire stream cipher was developed by B. Schneier as a paper-and-pencil cipher. Solitaire gets its security from the inherent randomness in a shuffled deck of cards. In this paper we investigate semigroups and groups properties of the Solitaire stream cipher and its regular modiÞcations.

Journal: :IACR Cryptology ePrint Archive 2013
Sui-Guan Teo Harry Bartlett Ali Al-Hamdan Leonie Ruth Simpson Kenneth Koon-Ho Wong Ed Dawson

Well-designed initialisation and keystream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct keystream. In this paper, we analyse some ciphers where this does not happen due to state convergence occurring either during initialisation, keystream generation or both. We show how state convergence occurs in each case and identify two mechanisms which c...

Journal: :Logical Methods in Computer Science 2009
Hans Zantema

Streams are infinite sequences over a given data type. A stream specification is a set of equations intended to define a stream. We propose a transformation from such a stream specification to a term rewriting system (TRS) in such a way that termination of the resulting TRS implies that the stream specification is well-defined, that is, admits a unique solution. As a consequence, proving well-d...

2011
Martin Ågren Martin Hell Thomas Johansson Willi Meier

A new version of the stream cipher Grain-128 is proposed. The new version, Grain-128a, is strengthened against all known attacks and observations on the original Grain-128, and has built-in support for authentication. The changes are modest, keeping the basic structure of Grain-128. This gives a high confidence in Grain-128a and allows for easy updating of existing implementations.

2008
Joan Daemen Paris Kitsos

We present a design approach for hardware-oriented selfsynchronizing stream ciphers and illustrate it with a concrete design called Moustique. The latter is intended as a research cipher: it proves that the design approach can lead to concrete results and will serve as a target for cryptanalysis where new attacks may lead to improvements in the design approach such as new criteria for the ciphe...

2002
Patrik Ekdahl Thomas Johansson

In 2000, the stream cipher SNOW was proposed. A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. The new version of the cipher does not only appear to be more secure, but its implementation is also a bit faster in software.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید