Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,252,478 papers from all fields of science
Search
Sign In
Create Free Account
ESTREAM
Known as:
ECRYPT Stream Cipher project
eSTREAM is a project to "identify new stream ciphers suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
ABC (stream cipher)
Block cipher
CJCSG
CRYPTREC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0
P. Kitsos
,
N. Sklavos
,
George Provelengios
,
A. Skodras
Microprocessors and microsystems
2013
Corpus ID: 27071958
2009
2009
Heuristic guess-and-determine attacks on stream ciphers
H. Ahmadi
,
T. Eghlidos
IET Information Security
2009
Corpus ID: 45518001
Guess-and-determine (GD) attacks are general attacks on stream ciphers, which have often been implemented in an ad hoc manner…
Expand
Highly Cited
2008
Highly Cited
2008
New Stream Cipher Designs: The eSTREAM Finalists
M. Robshaw
,
O. Billet
2008
Corpus ID: 12519476
2008
2008
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks
Matt Henricksen
IEEE International Conference on High Performance…
2008
Corpus ID: 12926579
Information security is an essential consideration of any distributed network. However, security primitives that provide…
Expand
Highly Cited
2007
Highly Cited
2007
Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations
Martin Feldhofer
,
J. Wolkerstorfer
IEEE International Symposium on Circuits and…
2007
Corpus ID: 10220618
The implementation of security protocols in RFID systems is challenging because of the fierce constraints concerning power…
Expand
Highly Cited
2006
Highly Cited
2006
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
Simon Fischer
,
W. Meier
,
C. Berbain
,
Jean-François Biasse
,
M. Robshaw
International Conference on Cryptology in India
2006
Corpus ID: 15806591
Stream cipher initialisation should ensure that the initial state or keystream is not detectably related to the key and…
Expand
Highly Cited
2006
Highly Cited
2006
QUAD: A Practical Stream Cipher with Provable Security
C. Berbain
,
H. Gilbert
,
Jacques Patarin
International Conference on the Theory and…
2006
Corpus ID: 15370464
We introduce a practical stream cipher with provable security named QUAD. The cipher relies on the iteration of a multivariate…
Expand
2006
2006
Distinguishing Attack on SOBER-128 with Linear Masking
J. Cho
,
J. Pieprzyk
Australasian Conference on Information Security…
2006
Corpus ID: 15433522
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2…
Expand
2006
2006
Chosen-IV Statistical Attacks on eStream Ciphers
Markku-Juhani O. Saarinen
International Conference on Security and…
2006
Corpus ID: 4881548
d-Monomial tests are statistical randomness tests based on Algebraic Normal Form representation of a Boolean function, and were…
Expand
2005
2005
Distinguishing Attack on Grain
Shahram Khazaei
,
M. Hassanzadeh
,
M. Kiaei
2005
Corpus ID: 18894074
Grain is one of the simplest ECRYPT Stream Cipher project Candidates which deals with key and IV of length 80 and 64 respectively…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required