메뉴 건너뛰기




Volumn 5, Issue 1, 2011, Pages 48-59

Grain-128a: A new version of Grain-128 with optional authentication

Author keywords

Authentication; Cryptographic primitive; Grain 128a; Hardware attractive; Lightweight; MAC; Message authentication; Stream cipher

Indexed keywords

AUTHENTICATION; COMPUTER HARDWARE DESCRIPTION LANGUAGES;

EID: 84857184529     PISSN: 17411084     EISSN: 17411092     Source Type: Journal    
DOI: 10.1504/IJWMC.2011.044106     Document Type: Article
Times cited : (163)

References (37)
  • 1
    • 84857740683 scopus 로고    scopus 로고
    • 3GPP Document 1 128-EEA3 and 128-EIA3 specification, Ts, 3rd Generation Partnership Project (3GPP)
    • 3GPP (2010a) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 1 128-EEA3 and 128-EIA3 specification, Ts, 3rd Generation Partnership Project (3GPP). Available online at: http://www.gsmworld.com/our-work/programmes-andinitiatives/fraud-and- security/gsm-security-algorithms.htm
    • (2010) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
  • 2
    • 84857740683 scopus 로고    scopus 로고
    • 3GPP Document 2 ZUC specification, Ts, 3rd Generation Partnership Project (3GPP)
    • 3GPP (2010b) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 2 ZUC specification, Ts, 3rd Generation Partnership Project (3GPP). Available online at: http://www.gsmworld. com/ourwork/programmes-and-initiatives/fraud-and-security/gsm-security- algorithms.htm
    • (2010) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
  • 5
    • 48249111366 scopus 로고    scopus 로고
    • The MICKEY stream ciphers
    • Robshaw, M. and Billet, O. (Eds) Springer-Verlag
    • Babbage, S. and Dodd, M. (2008) 'The MICKEY stream ciphers', in Robshaw, M. and Billet, O. (Eds): New Stream Cipher Designs, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4986, pp.191-209.
    • (2008) New Stream Cipher Designs, Lecture Notes in Computer Science , vol.4986 , pp. 191-209
    • Babbage, S.1    Dodd, M.2
  • 6
    • 70350663169 scopus 로고    scopus 로고
    • Algebraic and correlation attacks against linearly filtered non linear feedback shift registers
    • Avanzi, R., Keliher, L. and Sica, F. (Eds) Springer-Verlag
    • Berbain, C., Gilbert, H. and Joux, A. (2008) 'Algebraic and correlation attacks against linearly filtered non linear feedback shift registers', in Avanzi, R., Keliher, L. and Sica, F. (Eds): Selected Areas in Cryptography - SAC 2008, Lecture Notes in Computer Science, Springer-Verlag, Vol. 5381, pp.184-198.
    • (2008) Selected Areas in Cryptography - SAC 2008, Lecture Notes in Computer Science , vol.5381 , pp. 184-198
    • Berbain, C.1    Gilbert, H.2    Joux, A.3
  • 9
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • Preneel, B. (Ed.) Springer-Verlag
    • Canteaut, A. and Trabbia, M. (2000) 'Improved fast correlation attacks using parity-check equations of weight 4 and 5, in Preneel, B. (Ed.): Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag, pp.573-588.
    • (2000) Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 11
    • 84888039254 scopus 로고    scopus 로고
    • Fast correlation attacks: An algorithmic point of view
    • Chose, P., Joux, A. and Mitton, M. (2002) 'Fast correlation attacks: an algorithmic point of view', Lecture Notes in Computer Science, Vol. 2332, pp.209-221.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 209-221
    • Chose, P.1    Joux, A.2    Mitton, M.3
  • 20
    • 84955594784 scopus 로고
    • Intrinsic statistical weakness of keystream generators
    • Pieprzyk, J. and Safavi-Naini, R. (Eds) Springer-Verlag
    • Golić, J. (1994) 'Intrinsic statistical weakness of keystream generators', in Pieprzyk, J. and Safavi-Naini, R. (Eds): Advances in Cryptology - ASIACRYPT'94, Lecture Notes in Computer Science, Vol. 917, Springer-Verlag, pp.91-103.
    • (1994) Advances in Cryptology - ASIACRYPT'94, Lecture Notes in Computer Science , vol.917 , pp. 91-103
    • Golić, J.1
  • 21
    • 0030261891 scopus 로고    scopus 로고
    • Computation of low-weight parity-check polynomials
    • Golić, J.D. (1996) 'Computation of low-weight parity-check polynomials', Electronic Letters, Vol. 32, No. 21, pp.1981-1982. (Pubitemid 126606046)
    • (1996) Electronics Letters , vol.32 , Issue.21 , pp. 1981-1982
    • Golic, J.Dj.1
  • 22
    • 51849140875 scopus 로고    scopus 로고
    • Key-recovery attacks on universal hash function based MAC algorithms
    • Wagner, D. (Ed.) Springer-Verlag
    • Handschuh, H. and Preneel, B. (2008) 'Key-recovery attacks on universal hash function based MAC algorithms', Wagner, D. (Ed.): Advances in Cryptology - CRYPTO 2008, Lecture Notes in Computer Science, Vol. 5157, Springer-Verlag, pp.144-161.
    • (2008) Advances in Cryptology - CRYPTO 2008, Lecture Notes in Computer Science , vol.5157 , pp. 144-161
    • Handschuh, H.1    Preneel, B.2
  • 27
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • Bellare, M. (Ed.) Springer-Verlag
    • Johansson, T. and Jönsson, F. (2000) 'Fast correlation attacks through reconstruction of linear polynomials', in Bellare, M. (Ed.): Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, Vol. 1880, Springer-Verlag, pp.300-315.
    • (2000) Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science , vol.1880 , pp. 300-315
    • Johansson, T.1    Jönsson, F.2
  • 28
    • 84957367286 scopus 로고
    • New hash functions for message authentication
    • Springer-Verlag
    • Krawczyk, H. (1995) 'New hash functions for message authentication', Advances in Cryptology - EUROCRYPT'95, Springer-Verlag, pp.301-310.
    • (1995) Advances in Cryptology - EUROCRYPT'95 , pp. 301-310
    • Krawczyk, H.1
  • 29
    • 70349884792 scopus 로고    scopus 로고
    • Slide resynchronization attack on the initialization of grain 1.0
    • Küçük, Ö. (2006) Slide Resynchronization Attack on the Initialization of Grain 1.0, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/044. Available online at: http://www.ecrypt.eu.org/stream
    • (2006) ESTREAM, ECRYPT Stream Cipher Project, Report 2006/044
    • Küçük, O.1
  • 30
    • 70349858082 scopus 로고    scopus 로고
    • Related-key chosen IV attacks on grain-v1 and grain-128
    • Mu, Y., Susilo, W. and Seberry, J. (Eds) ACISP 2008, Lecture Notes in Computer Science Springer-Verlag
    • Lee, Y., Jeong, K., Sung, J. and Hong, S. (2008) 'Related-key chosen IV attacks on Grain-v1 and Grain-128, in Mu, Y., Susilo, W. and Seberry, J. (Eds): 13th Australasian Conference on Information Security and Privacy, ACISP 2008, Lecture Notes in Computer Science, Vol. 5107, Springer-Verlag, pp.321-335.
    • (2008) 13th Australasian Conference on Information Security and Privacy , vol.5107 , pp. 321-335
    • Lee, Y.1    Jeong, K.2    Sung, J.3    Hong, S.4
  • 32
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • Meier, W. and Staffelbach, O. (1989) 'Fast correlation attacks on certain stream ciphers', Journal of Cryptology, Vol. 1, No. 3, pp.159-176.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 33
    • 84958981368 scopus 로고    scopus 로고
    • Fast correlation attack algorithm with list decoding and an application
    • Mihaljević, M.J., Fossorier, M. and Imai, H. (2002) 'Fast correlation attack algorithm with list decoding and an application', Lecture Notes in Computer Science, Vol. 2355, pp.196-210.
    • (2002) Lecture Notes in Computer Science , vol.2355 , pp. 196-210
    • Mihaljević, M.J.1    Fossorier, M.2    Imai, H.3
  • 34
    • 84947926195 scopus 로고
    • Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers
    • Cryptography and Coding
    • Penzhorn, W. and Kühn, G. (1995) 'Computation of low-weight parity checks for correlation attacks on stream ciphers', in Boyd, C. (Ed.): Cryptography and Coding-5th IMA Conference, Lecture Notes in Computer Science, Vol. 1025, Springer-Verlag, pp.74-83. (Pubitemid 126019848)
    • (1995) Lecture Notes in Computer Science , Issue.1025 , pp. 74-83
    • Penzhorn, W.T.1    Kuehn, G.J.2
  • 35
    • 78651077262 scopus 로고    scopus 로고
    • Greedy distinguishers and nonrandomness detectors
    • Gong, G. and Gupta, K.C. (Eds) Springer-Verlag
    • Stankovski, P. (2010) 'Greedy distinguishers and nonrandomness detectors', in Gong, G. and Gupta, K.C. (Eds): Progress in Cryptology - INDOCRYPT 2010, Lecture Notes in Computer Science, Vol. 6498, Springer-Verlag, pp.210-226.
    • (2010) Progress in Cryptology - INDOCRYPT 2010, Lecture Notes in Computer Science , vol.6498 , pp. 210-226
    • Stankovski, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.