TRIVIUM is a hardware oriented synchronous stream cipher. It was designed as an exercise in exploring how far a stream cipher can be simplified without sacrificing its security, speed or flexibility. While simple designs are more likely to be vulnerable to simple, and possibly devastating, attacks (which is why we strongly discourage the use of TRIVIUM at this stage), they certainly inspire more confidence than complex schemes, if they survive a long period of public scrutiny despite their simplicity.

References in zbMATH (referenced in 22 articles )

Showing results 1 to 20 of 22.
Sorted by year (citations)

1 2 next

  1. Quedenfeld, Frank-M.; Wolf, Christopher: Advanced algebraic attack on Trivium (2016)
  2. Alhamdan, Ali; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho: Flaws in the initialisation process of stream ciphers (2015)
  3. Donda, Ariano-Tim; Samarin, Peter; Samotyja, Jacek; Lemke-Rust, Kerstin; Paar, Christof: Remote IP protection using timing channels (2015)
  4. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  5. Lallemand, Virginie; Naya-Plasencia, María: Cryptanalysis of full sprout (2015)
  6. Hu, Yu-Pu; Zhang, Feng-Rong; Zhang, Wen-Zheng: Hard fault analysis of trivium (2013)
  7. Gao, Xiao-Shan; Huang, Zhenyu: Characteristic set algorithms for equation solving in finite fields (2012)
  8. Hu, Yupu; Gao, Juntao; Liu, Qing; Zhang, Yiwei: Fault analysis of Trivium (2012)
  9. Knellwolf, Simon; Meier, Willi: High order differential attacks on stream ciphers (2012)
  10. Knellwolf, Simon; Meier, Willi; Naya-Plasencia, María: Conditional differential cryptanalysis of trivium and KATAN (2012)
  11. Simpson, Leonie; Boztas, Serdar: State cycles, initialization and the Trivium stream cipher (2012)
  12. Zajac, Pavol: Solving Trivium-based Boolean equations using the method of syllogisms (2012)
  13. Bogdanov, Andrey; Rechberger, Christian: A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN (2011)
  14. Maucher, M.; Schöning, U.; Kestler, H.A.: Search heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealing (2011)
  15. Eibach, Tobias; Völkel, Gunnar; Pilz, Enrico: Optimising Gröbner bases on Bivium (2010)
  16. Dinur, Itai; Shamir, Adi: Cube attacks on tweakable black box polynomials (2009)
  17. Lamberger, Mario; Nad, Tomislav; Rijmen, Vincent: Numerical solvers and cryptanalysis (2009)
  18. Fischer, Simon; Khazaei, Shahram; Meier, Willi: Chosen IV statistical analysis for key recovery attacks on stream ciphers (2008)
  19. Lee, Jooyoung; Yeom, Yongjin: Efficient RFID authentication protocols based on pseudorandom sequence generators (2008)
  20. Roy Chowdhury, Dipanwita (ed.); Rijmen, Vincent (ed.); Das, Abhijit (ed.): Progress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. Proceedings (2008)

1 2 next