• SNOW

  • Referenced in 28 articles [sw19554]
  • Johansson}, SNOW -- a new stream cipher, Proc. 1st NESSIE Workshop, Heverlee, Belgium (2000) brack ... cipher not only appears to be more secure, but its implementation is also...
  • QUAD

  • Referenced in 14 articles [sw19553]
  • security argument related to the whole stream cipher. We also briefly address software and hardware ... polynomials underlying the cipher, this leads to surprisingly inexpensive hardware implementations of QUAD...
  • Fish

  • Referenced in 6 articles [sw01254]
  • This paper describes a fast software stream cipher called Fish based on the shrinking principle ... Mbit/s is achieved with a C implementation...
  • MISTY

  • Referenced in 25 articles [sw24162]
  • cryptosystems MISTY1 and MISTY2, which are block ciphers with ... software implementation shows that MISTY1 with eight rounds can encrypt a data stream...
  • Quark

  • Referenced in 20 articles [sw08447]
  • been repeatedly expressed by professionals, notably to implement cryptographic protocols in RFID technology ... minimize memory requirements. Inspired by the stream cipher Grain and by the block cipher KATAN ... amongst the lightest secure ciphers), we present the hash function family Quark, composed of three ... Quark can be used for message authentication, stream encryption, or authenticated encryption. Our hardware evaluation...
  • Edon80

  • Referenced in 5 articles [sw36546]
  • belongs to a family of stream ciphers that in hardware can have a constant speed ... clock cycle, but in software implementation on popular modern CPUs can be made as slow...
  • HiTag2

  • Referenced in 9 articles [sw14133]
  • Hitag2 is a widely applied lightweight stream cipher with a traditional structure containing linear shift ... variables as its nonlinear filter. For easy implementation, this function is constructed...
  • SSC2

  • Referenced in 9 articles [sw03430]
  • SSC2 SSC2 is a fast software stream cipher designed for wireless handsets with limited computational ... compact structure that makes it easy to implement on 8-, 16-, and 32-bit processors...
  • KASUMI

  • Referenced in 20 articles [sw02926]
  • GPRS in the GEA3 key stream generator. KASUMI was designed for 3GPP to be used ... 3GPP standardization, instead of developing a new cipher, SAGE agreed with 3GPP technical specification group ... undergone some evaluation.[2] They chose the cipher algorithm MISTY1 developed[3] and patented ... algorithm was slightly modified for easier hardware implementation and to meet other requirements...
  • A2U2

  • Referenced in 2 articles [sw23607]
  • uses principles of stream cipher design and approaches from block cipher design. Our lightweight cryptographic ... tags, to develop a cipher that can be implemented with less than 300 gates, with ... benefit of high throughput provided by stream ciphers...
  • CAR30

  • Referenced in 3 articles [sw08370]
  • rule 30. CAR30 is a new stream cipher that uses classical Rule 30 of Cellular ... Linear Hybrid CA. This design can be implemented efficiently both in hardware and software ... security and implementation aspects of it. The main advantages of the proposed cipher ... ciphers like Grain and Trivium and better software speed than the software oriented stream cipher...
  • CASTREAM

  • Referenced in 2 articles [sw15302]
  • faster than Grain and Trivium. This stream cipher is extensible in terms of Key size ... provides configurable security and vendor specific implementation option. On implementation, the presented cipher receives higher...
  • JEROBOAM

  • Referenced in 1 article [sw24165]
  • JEROBOAM. We introduce a new fast stream cipher, JEROBOAM, working with ... These register are very easy to implement in software and produce a sequence of excellent...
  • VBF

  • Referenced in 2 articles [sw20673]
  • Boolean vector) from a cryptographic perspective. This implementation uses the NTL library from Victor Shoup ... cryptographic criteria for both block and stream ciphers as well as for hash functions...
  • FGb

  • Referenced in 240 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • GAP

  • Referenced in 2850 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • Macaulay2

  • Referenced in 1658 articles [sw00537]
  • Macaulay2 is a software system devoted to supporting...
  • Magma

  • Referenced in 2857 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5040 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 5883 articles [sw00554]
  • Almost any workflow involves computing results, and that...