نتایج جستجو برای: estream

تعداد نتایج: 184  

2007
Martin Feldhofer

This paper provides a comparison of the two stream cipher proposals Grain and Trivium which are candidates in the hardware focus phase of the eSTREAM project. We evaluate these algorithms concerning their feasibility to implement them for low-power applications in RFID systems. A triple of parameters which includes the chip area, the power consumption, and the number of clock cycles for encrypt...

2010
Mainack Mondal Debdeep Mukhopadhyay Abhijit Das

AES is the best known and most widely used block cipher. Its three versions (AES-128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively). Our present work investigates the recently reported attacks on AES 256 and AES 192. Instead of concentrating on the actual algorithms of these attacks we shall be more...

2010
Venkata Amirineni

ATHENA AUTOMATED TOOL FOR HARDWARE EVALUATION: SOFTWARE ENVIRONMENT FOR FAIR AND COMPREHENSIVE PERFORMANCE EVALUATION OF CRYPTOGRAPHIC HARDWARE USING FPGAS Venkata Amirineni, MS George Mason University, 2010 Thesis Director: Dr. Kris Gaj Fair comparison of the hardware efficiency of cryptographic algorithms, modeled in Hardware Description Languages and implemented using FPGAs, is a complex tas...

2010
Xiutao Feng Jun Liu Zhaocun Zhou Chuankun Wu Dengguo Feng

SOSEMANUK is a software-oriented stream cipher proposed by C. Berbain et al for the eSTREAM project and has been selected into the final portfolio. It is noticed that most components of SOSEMANUK can be calculated byte-oriented. Hence an attacker can observe SOSEMANUK from the view of byte units instead of the original 32-bit word units. Based on the above idea, in this work we present a new by...

2011
Yi Lu Serge Vaudenay Willi Meier Liping Ding Jianchun Jiang

It has been considered most important and difficult to analyze the bias and find a large bias regarding the security of cryptosystems, since the invention of linear cryptanalysis. The demonstration of a large bias will usually imply that the target crypto-system is not strong. Regarding the bias analysis, researchers often focus on a theoretical solution for a specific problem. In this paper, w...

2007
Takanori Isobe Toshihiro Ohigashi Hidenori Kuwakado Masakatu Morii

Biham and Seberry have submitted the stream cipher Py and Pypy to the ECRYPT stream cipher project (eSTREAM). A key recovery attack against Py and Pypy was proposed by Wu and Preneel. In their attack, (IV sizeb − 9) bytes of the key can be recovered with (IV sizeb − 4) × 2 chosen IVs, where IV sizeb indicates the size of the IV in bytes. For a 128-bit key and a 128-bit IV, which are recommended...

Journal: :IACR Cryptology ePrint Archive 2007
Benjamin Gittins Howard A. Landman

VEST is a set of four stream cipher families targeted to semiconductor applications. All VEST family members support efficient encryption, single pass authenticated encryption, and collision resistant hashing in the one low area module. VEST was submitted by Synaptic Laboratories Ltd. to the ECRYPT NoE eSTREAM project in 2005. Recently, a single digit typographical error was identified in the V...

2006
C. Berbain O. Billet A. Canteaut N. Courtois B. Debraize H. Gilbert L. Goubin A. Gouget L. Granboulan C. Lauradoux M. Minier T. Pornin H. Sibert Hongjun Wu

Decim is a hardware oriented stream cipher with 80-bit key and 64-bit IV which was submitted to the ECRYPT stream cipher project. The design of Decim is based on both a nonlinear filter LFSR and an irregular decimation mechanism called the ABSG. As a consequence, Decim is of low hardware complexity. Recently, Hongjun Wu and Bart Preneel pointed out two flaws in the stream cipher Decim. The firs...

Journal: :IACR Cryptology ePrint Archive 2009
Haina Zhang Xiaoyun Wang

Grain v1 is one of the 7 final candidates of ECRYPT eStream project, which involves in the 80-bit secret key. Grain-128 is a variant version with 128-bit secret key, and Grain v0 is the original version in the first evaluation phase. Firstly, we describe a distinguishing attack against the Grain family with weak Key-IVs. Utilizing the second Walsh spectra of the nonlinear functions, we show tha...

2007
Philippe Bulens Kassem Kalach François-Xavier Standaert Jean-Jacques Quisquater

Efficient cryptographic implementations are a fundamental factor in the achievement and dissemination of new computerized applications. In some recent environments with (very) limited resources such as smart cards, sensor networks or RFID tags, standard algorithms may not be completely adapted.Consequently, the design of new solutions for low-cost cryptography is sometimes necessary and is at l...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید