TRIVIUM is a hardware oriented synchronous stream cipher. It was designed as an exercise in exploring how far a stream cipher can be simplified without sacrificing its security, speed or flexibility. While simple designs are more likely to be vulnerable to simple, and possibly devastating, attacks (which is why we strongly discourage the use of TRIVIUM at this stage), they certainly inspire more confidence than complex schemes, if they survive a long period of public scrutiny despite their simplicity.

References in zbMATH (referenced in 34 articles )

Showing results 1 to 20 of 34.
Sorted by year (citations)

1 2 next

  1. Sarkar, Santanu; Dey, Prakash; Adhikari, Avishek; Maitra, Subhamoy: Probabilistic signature based generalized framework for differential fault analysis of stream ciphers (2017)
  2. Zajac, Pavol: Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (2017)
  3. Quedenfeld, Frank-M.; Wolf, Christopher: Advanced algebraic attack on Trivium (2016)
  4. Alhamdan, Ali; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho: Flaws in the initialisation process of stream ciphers (2015)
  5. Donda, Ariano-Tim; Samarin, Peter; Samotyja, Jacek; Lemke-Rust, Kerstin; Paar, Christof: Remote IP protection using timing channels (2015)
  6. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  7. Lallemand, Virginie; Naya-Plasencia, María: Cryptanalysis of full sprout (2015)
  8. Winter, Richard; Salagean, Ana; Phan, Raphael C.-W.: Comparison of cube attacks over different vector spaces (2015)
  9. Hu, Yu-Pu; Zhang, Feng-Rong; Zhang, Wen-Zheng: Hard fault analysis of trivium (2013)
  10. Shou, Yanbo; Guyennet, Herve; Lehsaini, Mohamed: Parallel scalar multiplication on elliptic curves in wireless sensor networks (2013)
  11. Gao, Xiao-Shan; Huang, Zhenyu: Characteristic set algorithms for equation solving in finite fields (2012)
  12. Hu, Yupu; Gao, Juntao; Liu, Qing; Zhang, Yiwei: Fault analysis of Trivium (2012)
  13. Karakoç, Ferhat; Demirci, Hüseyin; Harmancı, A.Emre: Combined differential and linear cryptanalysis of reduced-round PRINTcipher (2012)
  14. Karmakar, Sandip; Chowdhury, Dipanwita Roy: NOCAS: a nonlinear cellular automata based stream cipher (2012)
  15. Knellwolf, Simon; Meier, Willi: High order differential attacks on stream ciphers (2012)
  16. Knellwolf, Simon; Meier, Willi; Naya-Plasencia, María: Conditional differential cryptanalysis of trivium and KATAN (2012)
  17. Simpson, Leonie; Boztas, Serdar: State cycles, initialization and the Trivium stream cipher (2012)
  18. Zajac, Pavol: Solving Trivium-based Boolean equations using the method of syllogisms (2012)
  19. Bogdanov, Andrey; Rechberger, Christian: A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN (2011)
  20. Borghoff, Julia; Knudsen, Lars R.; Matusiewicz, Krystian: Hill climbing algorithms and Trivium (2011)

1 2 next