نتایج جستجو برای: trivium

تعداد نتایج: 145  

2010
Mate Soos

When cryptographical problems are treated in SAT solvers, they often contain large set of XOR constraints. Treating these XOR constraints through on-the-fly Gaussian elimination during solving has been shown to be a viable approach by Soos et al. We describe various enhancements to this scheme which increase the performance and mostly eliminate the need for manual tuning of parameters. With the...

Journal: :IACR Cryptology ePrint Archive 2009
Michael Vielhaber

The stream cipher BIVIUM (both BIVIUM-A and BIVIUM-B), a modification of the eSTREAM finalist TRIVIUM, can be broken completely by the Algebraic IV Differential Attack, AIDA, using 227.5 simulations or one minute of dual core processing. AIDA uses the subspaces of two 32-dimensional vector spaces over subsets of IV bits to recover 56 of the 80 key bits. The remaining 24 key bits are most easily...

Journal: :Jurnal Elemen 2023

In implementing Ethnomathematics-Realistic Mathematics Education (Ethno-RME), teaching mathematics correctly is needed through learning practices in and activities. This pedagogical activity requires guidance the form of a curriculum. So, teacher can determine ethnomathematics context as starting point using Ethno-RME. Therefore, this paper focuses on constructing an Ethno-RME curriculum to gui...

2007
Wieland Fischer Berndt M. Gammel O. Kniffler Joachim Velten

Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [8] and template attacks [10], or provide a theoretical analysis [6], [7] of weaknesses of stream cipher constructions. In this paper we present attacks on two focus ...

2017
Levent Ertaul Arnold Woodall

In this paper, we evaluate the software implementation of eSTREAM Profile II finalists (Grain, MICKEY, and Trivium) on a NodeMCU development kit 1.0 microcontroller. The NodeMCU is programmed by Arduino IDE to run a C++ code that awaits TCP communication over a WiFi network to encrypt or decrypt text using these lightweight stream ciphers. Throughput performance of the cipher implementations on...

2007
Håkan Englund Thomas Johansson Meltem Sönmez Turan

Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generalize this idea and propose a framework for chosen IV statistical attacks using a polynomial description. We propose a few new statistical attacks, apply them on some existing stream cipher proposals, and give some conclu...

2007
Patrick Schaumont Ingrid Verbauwhede

The ESTREAM project has identified two profiles for stream ciphers: a hardware profile and a software profile. The software profile is directly applicable to many computer systems. The hardware profile, on the other hand, does not reflect a complete system design, but instead represents a stand-alone component. In this paper we consider the integration of hardware stream ciphers in software sys...

Journal: :Hipogrifo. Revista de literatura y cultura del Siglo de Oro 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید