Trivium (cipher)
Top View
- Performance Analysis of Secured Synchronous Stream Ciphers
- The Estream Project
- Design Methodology of Secure Rfid Tag Implementation
- Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
- On Statistical Analysis of Synchronous Stream Ciphers
- On the Hardness of Trivium and Grain with Respect to Generic Time-Memory-Data Tradeoff Attacks
- Pseudo-Boolean Black-Box Optimization Methods in the Context of Divide-And-Conquer Approach to Solving Hard SAT Instances
- Algebraic and Correlation Attacks Against Linearly Filtered Non Linear Feedback Shift Registers
- Hardware Evaluation of Estream Candidates
- Neutrality-Based Symmetric Cryptanalysis
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Which Phase-3 Estream Ciphers Provide the Best Software Speeds?
- Comparison of Hardware Performance of Selected Phase II Estream Candidates
- New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
- On the Design of Trivium
- Which Estream Ciphers Have Been Broken?
- Algebraic Analysis of Trivium-Like Ciphers (Poster)
- Vulnerability Analysis of Salsa20 Differential Analysis and Deep Learning Analysis of Salsa20