A new version of the stream cipher SNOW. In 2000, the stream cipher SNOW was proposed [{it P. Ekdahl} and {it T. Johansson}, SNOW -- a new stream cipher, Proc. 1st NESSIE Workshop, Heverlee, Belgium (2000) brack. A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. The new version of the cipher not only appears to be more secure, but its implementation is also a bit faster.

References in zbMATH (referenced in 28 articles )

Showing results 1 to 20 of 28.
Sorted by year (citations)

1 2 next

  1. Gong, Xinxin; Zhang, Bin: Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G (2020)
  2. Alawida, Moatsum; Samsudin, Azman; Teh, Je Sen; Alshoura, Wafa’ Hamdan: Deterministic chaotic finite-state automata (2019)
  3. Alekseychuk, A. N.; Koniushok, S. M.; Poremskyi, M. V.: Upper bounds on the imbalance of discrete functions implemented by sequences of finite automata (2019)
  4. Chetry, Moon K.; Bishoi, Susil Kumar; Matyas, Vashek: When lagged Fibonacci generators jump (2019)
  5. Mirzaee Shamsabad, Mohammad Reza; Dehnavi, Seyed Mojtaba; Mahmoodi Rishakani, Akbar: Randomized nonlinear software-oriented MDS diffusion layers (2019)
  6. Bishoi, Susil Kumar; Matyas, Vashek: Investigating results and performance of search and construction algorithms for word-based LFSRs, (\sigma)-LFSRs (2018)
  7. Cho, Kenichiro; Miyano, Takaya: Design and test of pseudorandom number generator using a star network of Lorenz oscillators (2017)
  8. Sălăgean, Ana; Winter, R.; Mandache-Sălăgean, Matei; Phan, Raphael C.-W.: Higher order differentiation over finite fields with applications to generalising the cube attack (2017)
  9. Chakraborty, Debrup; Sarkar, Palash: On modes of operations of a block cipher for authentication and authenticated encryption (2016)
  10. Duval, Sébastien; Lallemand, Virginie; Rotella, Yann: Cryptanalysis of the FLIP family of stream ciphers (2016)
  11. Feng, Xiutao; Gong, Guang: On algebraic immunity of trace inverse functions on finite fields of characteristic two (2016)
  12. Zaĭsev, S. N.: A triangular class of skew maximum-period polynomials (2016)
  13. Zhang, Bin; Xu, Chao; Meier, Willi: Fast correlation attacks over extension fields, large-unit linear approximation and cryptanalysis of SNOW 2.0 (2015)
  14. Sarkar, Palash: Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (2014)
  15. Li, Jie; Zheng, Jianliang: MaD2: an ultra-performance stream cipher for pervasive data encryption (2013)
  16. Sen Gupta, Sourav; Chattopadhyay, Anupam; Khalid, Ayesha: Designing integrated accelerator for stream ciphers with structural similarities (2013)
  17. Hermelin, Miia; Nyberg, Kaisa: Multidimensional linear distinguishing attacks and Boolean functions (2012)
  18. Esmaeili Salehani, Yaser; Kircanski, Aleksandar; Youssef, Amr: Differential fault analysis of Sosemanuk (2011)
  19. Krovetz, Ted; Rogaway, Phillip: The software performance of authenticated-encryption modes (2011)
  20. Meier, Willi: Fast correlation attacks: methods and countermeasures (2011)

1 2 next