Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,445,766 papers from all fields of science
Search
Sign In
Create Free Account
ESTREAM
Known as:
ECRYPT Stream Cipher project
eSTREAM is a project to "identify new stream ciphers suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
ABC (stream cipher)
Block cipher
CJCSG
CRYPTREC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Matthias Krause
IACR Cryptology ePrint Archive
2017
Corpus ID: 3902530
Time-Memory-Data tradeoff attacks (TMD-attacks) like those of Babbage [1], Biryukov and Shamir [2] and Dunkelman, Keller [5…
Expand
2011
2011
ECRYPT Stream Cipher Project
C. Fontaine
,
B. Bhanu
,
+25 authors
C. Paar
Encyclopedia of Cryptography and Security
2011
Corpus ID: 12145300
2008
2008
eSTREAM Software Performance
C. Cannière
The eSTREAM Finalists
2008
Corpus ID: 30590844
In order to evaluate their performance in software, all Profile 1 candidates were subjected to benchmark tests. This chapter…
Expand
2008
2008
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks
Matt Henricksen
IEEE International Conference on High Performance…
2008
Corpus ID: 12926579
Information security is an essential consideration of any distributed network. However, security primitives that provide…
Expand
2008
2008
The eSTREAM Portfolio (rev. 1)
S. Babbage
,
A. Canteaut
,
+6 authors
M. Robshaw
2008
Corpus ID: 85439124
Following the publication of cryptanalytic results [3] against F-FCSR-H v2 [1], we have decided to make our first revision to the…
Expand
2006
2006
Distinguishing Attack on SOBER-128 with Linear Masking
J. Cho
,
J. Pieprzyk
Australasian Conference on Information Security…
2006
Corpus ID: 15433522
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2…
Expand
2006
2006
Chosen-IV Statistical Attacks on eStream Ciphers
Markku-Juhani O. Saarinen
International Conference on Security and…
2006
Corpus ID: 4881548
d-Monomial tests are statistical randomness tests based on Algebraic Normal Form representation of a Boolean function, and were…
Expand
2006
2006
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
Shahram Khazaei
,
Mahdi M. Hasanzadeh
,
M. Kiaei
IACR Cryptology ePrint Archive
2006
Corpus ID: 24822381
Grain and Trivium are two hardware oriented synchronous stream ciphers proposed as the simplest candidates to the ECRYPT Stream…
Expand
Review
2006
Review
2006
Comparative Analysis of the Structures of eSTREAM Submitted Stream Ciphers
M. Afzal
,
F. Kausar
,
A. Masood
International Conference on Emerging Technologies
2006
Corpus ID: 22648833
Unlike block ciphers, stream ciphers do not have a standard model. A variety of structures are followed in stream cipher design…
Expand
2005
2005
Linear Sequential Circuit Approximation of the TRIVIUM Stream Cipher
Shahram Khazaei
,
M. Hassanzadeh
2005
Corpus ID: 17853646
Abstract TRIVIUM is the simplest ECRYPT Stream Cipher project Candidate which deals with key and IV of length 80. Using the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE