Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,629 papers from all fields of science
Search
Sign In
Create Free Account
HC-256
Known as:
HC-128
HC-256 is a stream cipher designed to provide bulk encryption in software at high speeds while permitting strong confidence in its security. A 128…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Comparison of cryptography libraries
Cryptographic hash function
Cycles per byte
ESTREAM
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
On Using TLS to Secure In-Vehicle Networks
Daniel Zelle
,
C. Krauß
,
H. Strauss
,
Karsten Schmidt
ARES
2017
Corpus ID: 34569043
A trend in modern in-vehicle networks is the use of network technologies with higher bandwidth such as Automotive Ethernet. As a…
Expand
2013
2013
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
G. Paul
,
S. Maitra
,
A. Chattopadhyay
IACR Cryptology ePrint Archive
2013
Corpus ID: 6475570
RC4 has remained the most popular software stream cipher since the last two decades. In parallel to cryptanalytic attempts…
Expand
2011
2011
A Theoretical Analysis of the Structure of HC-128
G. Paul
,
S. Maitra
,
Shashwat Raizada
International Workshop on Security
2011
Corpus ID: 40266056
HC-128 is an eSTREAM finalist and no practical attack on this cipher is known. We show that the knowledge of any one of the two…
Expand
2010
2010
Differential Fault Analysis of HC-128
Aleksandar Kircanski
,
A. Youssef
International Conference on Cryptology in Africa
2010
Corpus ID: 12711835
HC-128 is a high speed stream cipher with a 128-bit secret key and a 128-bit initialization vector. It has passed all the three…
Expand
2010
2010
A Combinatorial Analysis of HC-128
G. Paul
,
S. Maitra
,
Shashwat Raizada
IACR Cryptology ePrint Archive
2010
Corpus ID: 13519383
We show that the knowledge of any one of the two internal state arrays of HC-128 along with the knowledge of 2048 keystream words…
Expand
2009
2009
The Key and IV Setup of the Stream Ciphers HC-256 and HC-128
Yunyi Liu
,
Tuanfa Qin
International Conference on Networks Security…
2009
Corpus ID: 14691925
The key and IV setup algorithms of both HC-256 and HC-128 cipher are cryptanalyzed in this paper. Both ciphers are software…
Expand
2009
2009
A Cache Timing Analysis of HC-256
E. Zenner
ACM Symposium on Applied Computing
2009
Corpus ID: 15640714
In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner…
Expand
Highly Cited
2008
Highly Cited
2008
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers
Gordon Meiser
,
T. Eisenbarth
,
Kerstin Lemke-Rust
,
C. Paar
International Symposium on Industrial Embedded…
2008
Corpus ID: 7107004
This work is motivated by the question of how efficient modern stream ciphers in the eSTREAM project (Profile I) can be…
Expand
Highly Cited
2008
Highly Cited
2008
The eSTREAM Portfolio
S. Babbage
,
C. Cannière
,
+7 authors
M. Robshaw
2008
Corpus ID: 16749549
The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit…
Expand
Highly Cited
2004
Highly Cited
2004
A New Stream Cipher HC-256
Hongjun Wu
Fast Software Encryption Workshop
2004
Corpus ID: 9120319
Stream cipher HC-256 is proposed in this paper. It generates keystream from a 256-bit secret key and a 256-bit initialization…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE