QUAD: Overview and Recent Developments
نویسندگان
چکیده
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [5]. The cipher relies on the iteration of a multivariate system of quadratic equations over a finite field, typically GF(2) or a small extension. In the binary case, the security of the keystream generation can be related, in the concrete security model, to the conjectured intractability of the MQ problem of solving a random system of m equations in n unknowns. We show that this security reduction can be extended to incorporate the key and IV setup and provide a security argument related to the whole stream cipher. We also briefly address software and hardware performance issues and show that if one is willing to pseudorandomly generate the systems of quadratic polynomials underlying the cipher, this leads to suprisingly inexpensive hardware implementations of QUAD.
منابع مشابه
An Overview of the New Feature Selection Methods in Finite Mixture of Regression Models
Variable (feature) selection has attracted much attention in contemporary statistical learning and recent scientific research. This is mainly due to the rapid advancement in modern technology that allows scientists to collect data of unprecedented size and complexity. One type of statistical problem in such applications is concerned with modeling an output variable as a function of a sma...
متن کاملAn Overview of Technological Developments in Medical Applications of X-Rays and Radioactivity
The years 1895 to 1898 were momentous for their impact on health and human well beings. First, Wilhelm Roentgen noted a glowing fluorescent screen, caused by invisible rays. This event subsequently led to the discovery of X-rays in 1895, and thus the birth of the “atomic ageâ€. Next Becquerel’s investigations of these mysterious rays led to his experiments with uranium salt crystals. He th...
متن کاملOverview of Portfolio Optimization Models
Finding the best way to optimize the portfolio after Markowitz's 1952 article has always been and will continue to be one of the concerns of activists in the investment management industry. Researchers have come up with different solutions to overcome this problem. The introduction of mathematical models and meta-heuristic models is one of the activities that has influenced portfolio optimizati...
متن کاملAn Overview of Stem Cells Applications in Military Medicine
War's nature is constantly changing over time with the progress in military technology and weapons of war, which has led to a diverse pattern of tissue injuries. Developments in personal protective equipment and body armor, rapid transfer from the battlefield to medical centers, improved resuscitation measures, bleeding control, and wound management have increasingly contributed to the wounded ...
متن کاملAn overview of therapeutic approaches to brain tumor stem cells
Primary and secondary malignant central nervous system (CNS) tumors are devastating invasive tumors able to give rise to many kinds of differentiated tumor cells. Glioblastoma multiform (GBM), is the most malignant brain tumor, in which its growth and persistence depend on cancer stem cells with enhanced DNA damage repair program that also induces recurrence and resists current chemo- and radi...
متن کامل