نتایج جستجو برای: estream

تعداد نتایج: 184  

2007
Martin Hell Thomas Johansson

Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 nal hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 2 simple operations for a keystream...

2008
Orr Dunkelman Nathan Keller

In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we s...

Journal: :IACR Cryptology ePrint Archive 2008
Michael Vielhaber

The eStream cipher proposal Trivium outputs an XOR sum of six internal state bits. These in turn are obtained from 18 bits linearly, plus six ANDings of two bits each. We show that 4 of the 18 linear terms cancel between themselves.

2006
Erik Zenner

The eStream project has given us a number of insights into design criteria for stream ciphers. Some of them were disputed, on others everyone seemed to agree. In this paper, the author describes what he has learned and what he considers as possible consequences for stream cipher design. The paper does not contain any groundbreaking new results; it is merely meant as a collection of ideas and an...

2006
Li An-Ping

In this paper, we will give one update for our submitted primitive DICING for eSTREAM, where we have simplified the initialization and made some small changes in the equations (2.3) and (2.16) to enhance the security and the efficiency.

2006
Li An-Ping

In this paper, we will give one update for our submitted primitive DICING for eSTREAM, where we have simplified the initialization and made some small changes in the equations (2.3) and (2.16) to enhance the security and the efficiency.

2008
Benedikt Gierlichs Lejla Batina Christophe Clavier Thomas Eisenbarth Aline Gouget Helena Handschuh Timo Kasper Kerstin Lemke-Rust Stefan Mangard Amir Moradi Elisabeth Oswald

We analyze the relevant candidates in phase 3 of the eSTREAM project with respect to side channel analysis in a theoretical approach.

2008
Daniel J. Bernstein

Salsa20 is a family of 256-bit stream ciphers designed in 2005 and submitted to eSTREAM, the ECRYPT Stream Cipher Project. Salsa20 has progressed to the third round of eSTREAM without any changes. The 20-round stream cipher Salsa20/20 is consistently faster than AES and is recommended by the designer for typical cryptographic applications. The reduced-round ciphers Salsa20/12 and Salsa20/8 are ...

2007
Carmi Gressel Orr Dunkelman Avi Hecht

The ZK-Crypt combination compact hardware stream cipher engines each include a true random number generator, a stream cipher and a data authenticator based on a fast compact engine and proven "noise sources". The ZK-Crypt II 7.0 K gate and ZK-Crypt 8.2 K gate "engines" output a 32 bit word at each clock cycle with 128 and 160-bit keys, maximizing throughput with very low energy per enciphered b...

2007
Kris Gaj Gabriel Southern Ramakrishna Bachimanchi

Five leading Phase 2 Profile 2 eSTREAM candidates have been implemented in hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs). An old GSM encryption algorithm A5/1 has been included in the study as well. All six ciphers have been analyzed from the point of view of the hardware efficiency, and two h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید