Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers. c © 2010 ISC. All rights reserved.
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improv...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...
In this paper, we introduce a new time-memory-data trade-off attack which can perform better than ex...
Conference: 20th International Symposium on Computer and Information Sciences, Istanbul, TURKEY, OCT...
Martin Hellman proposed the first time-memory tradeoff attack on block ciphers. It is a chosen plain...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Abstract: In this paper, we present a framework for guess-and-determine attack on stream ciphers tha...
10.1145/2414456.2414466ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications ...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
Cache Timing Attacks have attracted a lot of cryptographic attention due to their relevance for the...
Abstract. In this paper we show that Time-Memory tradeoff by Hellman may be extended to Time-Memory-...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
eSTREAM is a project that was developed over a period of several years. It had the objective of acti...
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improv...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...
In this paper, we introduce a new time-memory-data trade-off attack which can perform better than ex...
Conference: 20th International Symposium on Computer and Information Sciences, Istanbul, TURKEY, OCT...
Martin Hellman proposed the first time-memory tradeoff attack on block ciphers. It is a chosen plain...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Abstract: In this paper, we present a framework for guess-and-determine attack on stream ciphers tha...
10.1145/2414456.2414466ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications ...
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
Cache Timing Attacks have attracted a lot of cryptographic attention due to their relevance for the...
Abstract. In this paper we show that Time-Memory tradeoff by Hellman may be extended to Time-Memory-...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
eSTREAM is a project that was developed over a period of several years. It had the objective of acti...
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improv...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...