International audienceTrivium is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate count in hardware, and reasonably efficient software implementation. It was designed in 2005 by C. De Cannière and B. Preneel for the European project eSTREAM. It has successfully moved into phase two of the selection process and is currently in the focus group under the hardware category. As of yet there has been no attack on Trivium faster than exhaustive search. Bivium-A and Bivium-B are truncated versions of Trivium that are built on the same design principles. These simplified versions are used for investigating Trivium-like ciphers with a reduced complexity. There have been successful attempts in the cryptanalys...
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorith...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
Saarinen recently proposed a chosen IV statistical attack, called the $d$-monomial test, and used it...
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, w...
Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase th...
This paper presents an algebraic attack against Trivium that breaks 625 rounds using only 4096 bits ...
In this paper we present a bitstream modification attack on the Trivium cipher, an international sta...
One of the eSTREAM final portfolio ciphers is the hardwareoriented stream cipher Trivium. It is base...
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryp...
Trivium is a hardware-oriented stream cipher designed in 2005 by de Canni`ere and Preneel for the Eu...
Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in c...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
In this paper, we propose a new stream cipher construction based on block cipher design principles. ...
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorith...
Fault attack is referred to as an attack that targets mainly on cryptographic algorithms of a smart ...
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorith...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
Saarinen recently proposed a chosen IV statistical attack, called the $d$-monomial test, and used it...
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, w...
Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase th...
This paper presents an algebraic attack against Trivium that breaks 625 rounds using only 4096 bits ...
In this paper we present a bitstream modification attack on the Trivium cipher, an international sta...
One of the eSTREAM final portfolio ciphers is the hardwareoriented stream cipher Trivium. It is base...
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryp...
Trivium is a hardware-oriented stream cipher designed in 2005 by de Canni`ere and Preneel for the Eu...
Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in c...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
In this paper, we propose a new stream cipher construction based on block cipher design principles. ...
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorith...
Fault attack is referred to as an attack that targets mainly on cryptographic algorithms of a smart ...
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorith...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
Saarinen recently proposed a chosen IV statistical attack, called the $d$-monomial test, and used it...