نتایج جستجو برای: eSTREAM

تعداد نتایج: 184  

2006
L. Batina S. Kumar J. Lano K. Lemke N. Mentens C. Paar B. Preneel K. Sakiyama I. Verbauwhede

The aim of eSTREAM Profile II is to identify a small number of stream ciphers that are suitable for low resource circuitry based implementation. Besides algorithmic properties and security evaluation to theoretical attacks, performance evaluation is another important task of eSTREAM that is being considered. In this contribution we summarize and explain our testing framework for eSTREAM Profile...

Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.

2007
Marcin Rogawski

The results of five eSTREAM candidates using ALTERA Field Programmable Gate Arrays are presented and analyzed. Implementation costs and performance of chosen architectures are compared and disscussed. The chosen eSTREAM proposals are divided into four classes regarding the results of their implementation features.

Journal: :Des. Codes Cryptography 2013
Orr Dunkelman Nathan Keller

In [6], Biryukov presented a new methodology of stream cipher design called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity, and performance, was expected to be selected to the eSTREAM portfolio. In this paper we ...

2009
Vincent Rijmen

Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers. c © 2010 ISC. All rights reserved.

2008
Matthew J. B. Robshaw

2008
Steve Babbage Christophe De Cannière Anne Canteaut Carlos Cid Henri Gilbert Thomas Johansson Matthew Parker Bart Preneel Vincent Rijmen Matthew Robshaw

The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.

2017
Song Wu Xingjun Wang Hai Jin Haibao Chen

Batched stream processing systems achieve higher throughput than traditional stream processing systems while providing low latency guarantee. Recently, batched stream processing systems tend to be deployed in cloud due to their requirement of elasticity and cost efficiency. However, the performance of batched stream processing systems are hardly guaranteed in cloud because static resource provi...

2007
Cédric Lauradoux

The profile 1 submissions to the eSTREAM call for stream ciphers aim at achieving a high throughput in software. But, for the embedded systems, the trade-off between the throughput and the code size is more critical. We here study the ROM footprints of several eSTREAM stream ciphers on an ARM920T processor. Most notably we propose some modifications in the implementations of several ciphers whi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید