Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,168,517 papers from all fields of science
Search
Sign In
Create Free Account
ESTREAM
Known as:
ECRYPT Stream Cipher project
eSTREAM is a project to "identify new stream ciphers suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
ABC (stream cipher)
Block cipher
CJCSG
CRYPTREC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
ECRYPT Stream Cipher Project
C. Fontaine
,
B. Bhanu
,
+25 authors
C. Paar
Encyclopedia of Cryptography and Security
2011
Corpus ID: 12145300
2008
2008
eSTREAM Software Performance
C. Cannière
The eSTREAM Finalists
2008
Corpus ID: 30590844
In order to evaluate their performance in software, all Profile 1 candidates were subjected to benchmark tests. This chapter…
Expand
2008
2008
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks
Matt Henricksen
IEEE International Conference on High Performance…
2008
Corpus ID: 12926579
Information security is an essential consideration of any distributed network. However, security primitives that provide…
Expand
Highly Cited
2008
Highly Cited
2008
The eSTREAM Portfolio
S. Babbage
,
C. Cannière
,
+7 authors
M. Robshaw
2008
Corpus ID: 16749549
The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit…
Expand
2008
2008
The eSTREAM Portfolio (rev. 1)
S. Babbage
,
A. Canteaut
,
+6 authors
M. Robshaw
2008
Corpus ID: 85439124
Following the publication of cryptanalytic results [3] against F-FCSR-H v2 [1], we have decided to make our first revision to the…
Expand
Highly Cited
2007
Highly Cited
2007
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Håkan Englund
,
T. Johansson
,
Meltem Sönmez Turan
International Conference on Cryptology in India
2007
Corpus ID: 18097959
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several…
Expand
2007
2007
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs
F. Arnault
,
T. Berger
,
C. Lauradoux
,
M. Minier
International Conference on Cryptology in India
2007
Corpus ID: 9390017
Feedback with Carry Shift Registers (FCSRs) are a promising alternative to LFSRs in the design of stream ciphers. The previous…
Expand
2006
2006
Distinguishing Attack on SOBER-128 with Linear Masking
J. Cho
,
J. Pieprzyk
Australasian Conference on Information Security…
2006
Corpus ID: 15433522
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2…
Expand
2006
2006
Algebraic Attacks on Clock-Controlled Stream Ciphers
S. Al-Hinai
,
L. Batten
,
B. Colbert
,
Kenneth Koon-Ho Wong
Australasian Conference on Information Security…
2006
Corpus ID: 32740805
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register…
Expand
2006
2006
Chosen-IV Statistical Attacks on eStream Ciphers
Markku-Juhani O. Saarinen
International Conference on Security and…
2006
Corpus ID: 4881548
d-Monomial tests are statistical randomness tests based on Algebraic Normal Form representation of a Boolean function, and were…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE