The Poly1305-AES message-authentication code
DJ Bernstein - International workshop on fast software encryption, 2005 - Springer
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety
of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length …
of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length …
Breaking Grain-128 with dynamic cube attacks
I Dinur, A Shamir - Fast Software Encryption: 18th International Workshop …, 2011 - Springer
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard
cube attacks [4] find the key by solving a system of linear equations in the key bits, the new …
cube attacks [4] find the key by solving a system of linear equations in the key bits, the new …
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It
has been observed that a Boolean function f used as a cryptographic primitive, and …
has been observed that a Boolean function f used as a cryptographic primitive, and …
Basic theory in construction of Boolean functions with maximum possible annihilator immunity
So far there is no systematic attempt to construct Boolean functions with maximum
annihilator immunity. In this paper we present a construction keeping in mind the basic …
annihilator immunity. In this paper we present a construction keeping in mind the basic …
An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity
C Carlet, K Feng - International Conference on the Theory and …, 2008 - Springer
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and
the introduction of the related notion of algebraic immunity, several constructions of infinite …
the introduction of the related notion of algebraic immunity, several constructions of infinite …
Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity
Algebraic attack has recently become an important tool in cryptanalysing different stream
and block cipher systems. A Boolean function, when used in some cryptosystem, should be …
and block cipher systems. A Boolean function, when used in some cryptosystem, should be …
Further properties of several classes of Boolean functions with optimum algebraic immunity
Based on a method proposed by the first author, several classes of balanced Boolean
functions with optimum algebraic immunity are constructed, and they have nonlinearities …
functions with optimum algebraic immunity are constructed, and they have nonlinearities …
On the construction of Boolean functions with optimal algebraic immunity
N Li, L Qu, WF Qi, GZ Feng, C Li… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this correspondence, we introduce a method to construct Boolean functions in any
number of variables, with optimal algebraic immunity. Remarkably, all functions of this type …
number of variables, with optimal algebraic immunity. Remarkably, all functions of this type …
F-FCSR: design of a new class of stream ciphers
F Arnault, TP Berger - … Encryption: 12th International Workshop, FSE 2005 …, 2005 - Springer
In this paper we present a new class of stream ciphers based on a very simple mechanism.
The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This …
The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This …
A method of construction of balanced functions with optimum algebraic immunity
C Carlet - Coding and Cryptology, 2008 - World Scientific
Because of the recent algebraic attacks, a high algebraic immunity is now an absolutely
necessary (but not sufficient) property for Boolean functions used in stream ciphers. Very few …
necessary (but not sufficient) property for Boolean functions used in stream ciphers. Very few …