A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various cryptanalytic attacks. In this paper, we present a unified framework for the security of a design against these attacks based on the properties of the LFSR(s) and the Boolean function used. It is explained why building nonlinear filters seems more practical than building nonlinear combiners. We also investigate concrete building blocks that offer a good trade-off in their resistance against these various attacks, and can at the same time be used to build a low-cost synchronous stream cipher for hardware applications.status: publishe
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
Abstract. We introduce a new model- the Filter-Combiner model-for memoryless synchronous stream ciph...
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry...
Abstract. This paper describes some attacks on word-oriented stream ciphers that use a linear feedba...
One well-known method of generating key stream sequences for stream ciphers is to combine the output...
Proposal for a secure stream cipher based on Linear Feedback Shift Registers (LFSR) is presented her...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Algebraic attacks on stream ciphers [9] recover the key by solving an overdefined system of multiva...
International audienceThe combination generator is a popular stream cipher construction. It consists...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
Abstract. In this paper we extend the conditional correlation attack ([LCPP96]) against the nonlinea...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
Abstract. We introduce a new model- the Filter-Combiner model-for memoryless synchronous stream ciph...
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry...
Abstract. This paper describes some attacks on word-oriented stream ciphers that use a linear feedba...
One well-known method of generating key stream sequences for stream ciphers is to combine the output...
Proposal for a secure stream cipher based on Linear Feedback Shift Registers (LFSR) is presented her...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Algebraic attacks on stream ciphers [9] recover the key by solving an overdefined system of multiva...
International audienceThe combination generator is a popular stream cipher construction. It consists...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
Abstract. In this paper we extend the conditional correlation attack ([LCPP96]) against the nonlinea...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...