• Publications
  • Influence
Grain: a stream cipher for constrained environments
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on two shift registers and a non-linearExpand
  • 493
  • 43
  • PDF
A New Version of the Stream Cipher SNOW
TLDR
We propose a new version of the stream cipher SNOW, called SNOW 2.0, which appears to be more secure. Expand
  • 270
  • 23
  • PDF
A Stream Cipher Proposal: Grain-128
A new stream cipher, Grain-128, is proposed. The design is very small in hardware and it targets environments with very limited resources in gate count, power consumption, and chip area. Grain-128Expand
  • 237
  • 21
  • PDF
Grain-128a: a new version of Grain-128 with optional authentication
TLDR
A new version of the stream cipher Grain-128 is proposed. Expand
  • 168
  • 17
  • PDF
The Grain Family of Stream Ciphers
A new family of stream ciphers, Grain, is proposed. Two variants, a 80-bit and a 128-bit variant are specified, denoted Grain and Grain-128 respectively. The designs target hardware environmentsExpand
  • 186
  • 17
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
TLDR
A new algorithm for fast correlation attacks on stream ciphers is presented. Expand
  • 161
  • 17
  • PDF
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
TLDR
We present an efficient key recovery attack on the QC-MDPC scheme using the fact that decryption uses an iterative decoding step and this can fail with some small probability. Expand
  • 94
  • 16
  • PDF
Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes
TLDR
This paper describes new methods for fast correlation attacks, based on the theory of convolutional codes. Expand
  • 167
  • 12
  • PDF
Another attack on A5/1
TLDR
A5/1 is a stream cipher used in the Global System for Mobile Communications (GSM) standard. Expand
  • 144
  • 11
  • PDF
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
TLDR
We propose a framework for chosen IV statistical attacks using a polynomial description. Expand
  • 102
  • 11
  • PDF