The Poly1305-AES message-authentication code

DJ Bernstein - International workshop on fast software encryption, 2005 - Springer
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety
of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length …

Breaking Grain-128 with dynamic cube attacks

I Dinur, A Shamir - Fast Software Encryption: 18th International Workshop …, 2011 - Springer
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard
cube attacks [4] find the key by solving a system of linear equations in the key bits, the new …

Algebraic immunity for cryptographically significant Boolean functions: analysis and construction

C Carlet, DK Dalai, KC Gupta… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It
has been observed that a Boolean function f used as a cryptographic primitive, and …

Basic theory in construction of Boolean functions with maximum possible annihilator immunity

DK Dalai, S Maitra, S Sarkar - Designs, Codes and Cryptography, 2006 - Springer
So far there is no systematic attempt to construct Boolean functions with maximum
annihilator immunity. In this paper we present a construction keeping in mind the basic …

An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity

C Carlet, K Feng - International Conference on the Theory and …, 2008 - Springer
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and
the introduction of the related notion of algebraic immunity, several constructions of infinite …

Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity

DK Dalai, KC Gupta, S Maitra - International Workshop on Fast Software …, 2005 - Springer
Algebraic attack has recently become an important tool in cryptanalysing different stream
and block cipher systems. A Boolean function, when used in some cryptosystem, should be …

Further properties of several classes of Boolean functions with optimum algebraic immunity

C Carlet, X Zeng, C Li, L Hu - Designs, Codes and Cryptography, 2009 - Springer
Based on a method proposed by the first author, several classes of balanced Boolean
functions with optimum algebraic immunity are constructed, and they have nonlinearities …

On the construction of Boolean functions with optimal algebraic immunity

N Li, L Qu, WF Qi, GZ Feng, C Li… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this correspondence, we introduce a method to construct Boolean functions in any
number of variables, with optimal algebraic immunity. Remarkably, all functions of this type …

F-FCSR: design of a new class of stream ciphers

F Arnault, TP Berger - … Encryption: 12th International Workshop, FSE 2005 …, 2005 - Springer
In this paper we present a new class of stream ciphers based on a very simple mechanism.
The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This …

A method of construction of balanced functions with optimum algebraic immunity

C Carlet - Coding and Cryptology, 2008 - World Scientific
Because of the recent algebraic attacks, a high algebraic immunity is now an absolutely
necessary (but not sufficient) property for Boolean functions used in stream ciphers. Very few …