TRIVIUM is a hardware oriented synchronous stream cipher. It was designed as an exercise in exploring how far a stream cipher can be simplified without sacrificing its security, speed or flexibility. While simple designs are more likely to be vulnerable to simple, and possibly devastating, attacks (which is why we strongly discourage the use of TRIVIUM at this stage), they certainly inspire more confidence than complex schemes, if they survive a long period of public scrutiny despite their simplicity.

References in zbMATH (referenced in 41 articles )

Showing results 1 to 20 of 41.
Sorted by year (citations)

1 2 3 next

  1. Huang, Zhenyu; Sun (c), Yao; Lin, Dongdai: On the efficiency of solving Boolean polynomial systems with the characteristic set method (2021)
  2. Semenov, Alexander; Otpuschennikov, Ilya; Gribanova, Irina; Zaikin, Oleg; Kochemazov, Stepan: Translation of algorithmic descriptions of discrete functions to SAT with applications to cryptanalysis problems (2020)
  3. Li, Ting; Sun, Yao; Huang, Zhenyu; Wang, Dingkang; Lin, Dongdai: Speeding up the GVW algorithm via a substituting method (2019)
  4. Zhang, Shiyong; Chen, Gongliang: New results on the state cycles of Trivium (2019)
  5. Lin, Zhuosheng; Yu, Simin; Feng, Xiutao; Lü, Jinhu: Cryptanalysis of a chaotic stream cipher and its improved scheme (2018)
  6. Sarkar, Santanu; Dey, Prakash; Adhikari, Avishek; Maitra, Subhamoy: Probabilistic signature based generalized framework for differential fault analysis of stream ciphers (2017)
  7. Zaikin, Oleg; Manzyuk, Maxim; Kochemazov, Stepan; Bychkov, Igor; Semenov, Alexander: A volunteer-computing-based grid architecture incorporating idle resources of computational clusters (2017)
  8. Zajac, Pavol: Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (2017)
  9. Quedenfeld, Frank-M.; Wolf, Christopher: Advanced algebraic attack on Trivium (2016)
  10. Alhamdan, Ali; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho: Flaws in the initialisation process of stream ciphers (2015)
  11. Donda, Ariano-Tim; Samarin, Peter; Samotyja, Jacek; Lemke-Rust, Kerstin; Paar, Christof: Remote IP protection using timing channels (2015)
  12. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  13. Lallemand, Virginie; Naya-Plasencia, María: Cryptanalysis of full sprout (2015)
  14. Winter, Richard; Salagean, Ana; Phan, Raphael C.-W.: Comparison of cube attacks over different vector spaces (2015)
  15. Zhang, Shiyong; Chen, Gongliang; Zhou, Yongkai; Li, Jianhua: Enhanced-bivium algorithm for RFID system (2015)
  16. Hu, Yu-Pu; Zhang, Feng-Rong; Zhang, Wen-Zheng: Hard fault analysis of Trivium (2013)
  17. Shou, Yanbo; Guyennet, Herve; Lehsaini, Mohamed: Parallel scalar multiplication on elliptic curves in wireless sensor networks (2013)
  18. Gao, Xiao-Shan; Huang, Zhenyu: Characteristic set algorithms for equation solving in finite fields (2012)
  19. Hu, Yupu; Gao, Juntao; Liu, Qing; Zhang, Yiwei: Fault analysis of Trivium (2012)
  20. Karakoç, Ferhat; Demirci, Hüseyin; Harmancı, A. Emre: Combined differential and linear cryptanalysis of reduced-round \textscPRINTcipher (2012)

1 2 3 next