We present several software and hardware implementations of QUAD, a recently introduced stream cipher designed to be provably secure and practical to implement. The software implementations target both a personal computer and an ARM microprocessor. The hardware implementations target field programmable gate arrays. The purpose of our work was to first find the baseline performance of QUAD implementations, then to optimize our implementations for throughput. Our software implementations perform comparably to prior work. Our hardware implementations are the first known implementations to use random coefficients, in agreement with QUAD’s security argument, and achieve much higher throughput than prior implementations
Abstract. We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmab...
This paper presents an effective field-programmable gate array (FPGA)-based hardware implementation ...
AES (Advanced Encryption Standard) accelerators are commonly used in high-throughput applications, b...
We give an outline of the specification and provable security features of the QUAD stream cipher pro...
We give an outline of the specification and provable security features of the QUAD stream cipher pro...
Abstract. We give an outline of the specification and provable security features of the QUAD stream ...
AbstractIn this paper we present the stream cipher QUAD and the provable security arguments supporti...
introduced QUAD, a parametrized family of stream ciphers. The article stated that “the security of t...
In a Eurocrypt 2006 article entitled QUAD: A Practical Stream Cipher with Provable Security, Berba...
In a Eurocrypt 2006 article entitled "QUAD: A Practical Stream Cipher with Provable Security," Berba...
In a Eurocrypt 2006 article entitled "QUAD: A Practical Stream Cipher with Provable Security," Berba...
Title: Analysis of the stream cipher QUAD Author: Marcel Čurilla Department: Katedra algebry Supervi...
AbstractRC4 is a popular stream cipher, which is widely used in many security protocols and standard...
Cryptography is the only practical method for protecting information transmitted through communicati...
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure ...
Abstract. We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmab...
This paper presents an effective field-programmable gate array (FPGA)-based hardware implementation ...
AES (Advanced Encryption Standard) accelerators are commonly used in high-throughput applications, b...
We give an outline of the specification and provable security features of the QUAD stream cipher pro...
We give an outline of the specification and provable security features of the QUAD stream cipher pro...
Abstract. We give an outline of the specification and provable security features of the QUAD stream ...
AbstractIn this paper we present the stream cipher QUAD and the provable security arguments supporti...
introduced QUAD, a parametrized family of stream ciphers. The article stated that “the security of t...
In a Eurocrypt 2006 article entitled QUAD: A Practical Stream Cipher with Provable Security, Berba...
In a Eurocrypt 2006 article entitled "QUAD: A Practical Stream Cipher with Provable Security," Berba...
In a Eurocrypt 2006 article entitled "QUAD: A Practical Stream Cipher with Provable Security," Berba...
Title: Analysis of the stream cipher QUAD Author: Marcel Čurilla Department: Katedra algebry Supervi...
AbstractRC4 is a popular stream cipher, which is widely used in many security protocols and standard...
Cryptography is the only practical method for protecting information transmitted through communicati...
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure ...
Abstract. We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmab...
This paper presents an effective field-programmable gate array (FPGA)-based hardware implementation ...
AES (Advanced Encryption Standard) accelerators are commonly used in high-throughput applications, b...