Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 1/2n, where n denotes the inner state length of the underlying keystream generator. In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags. Its hardware efficiency results from combining a Grain-like design with the FP(1)-mode, a recently suggested construction principle for the state initialization of stream ciphers, which offers provable 2/3n-security against TMD tradeoff attacks aiming at key recovery. Lizard uses 120-bit keys, 64-bit IVs and has an inner state length of 121 bit. It is supposed to provide 80-bit security against key recovery attack...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Most stream ciphers used in practice are vulnerable against generic collision attacks, which allow t...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
Devices of extremely small computational power like RFID tags are used in practice to a rapidly grow...
We propose and analyze the LIZARD-construction, a way to construct keystream generator (KSG) based s...
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has...
In the conference “Fast Software Encryption 2015”, a new line of research was proposed by introducin...
Lizard is a very recently proposed lightweight stream cipher that claims 60 bit security against dis...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Time-memory-data tradeoff (TMD-TO) attacks limit the security level of many classical stream ciphers...
After the introduction of some stream ciphers with the minimal internal state, the design idea of th...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Most stream ciphers used in practice are vulnerable against generic collision attacks, which allow t...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
Devices of extremely small computational power like RFID tags are used in practice to a rapidly grow...
We propose and analyze the LIZARD-construction, a way to construct keystream generator (KSG) based s...
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has...
In the conference “Fast Software Encryption 2015”, a new line of research was proposed by introducin...
Lizard is a very recently proposed lightweight stream cipher that claims 60 bit security against dis...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Time-memory-data tradeoff (TMD-TO) attacks limit the security level of many classical stream ciphers...
After the introduction of some stream ciphers with the minimal internal state, the design idea of th...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Most stream ciphers used in practice are vulnerable against generic collision attacks, which allow t...