The MICKEY Stream Ciphers. The family of stream ciphers MICKEY (which stands for Mutual Irregular Clocking KEYstream generator) is aimed at resource-constrained hardware platforms. It is intended to have low complexity in hardware, while providing a high level of security. It uses irregular clocking of shift registers, with some novel techniques to balance the need for guarantees on period and pseudorandomness against the need to avoid certain cryptanalytic attacks.

References in zbMATH (referenced in 15 articles )

Showing results 1 to 15 of 15.
Sorted by year (citations)

  1. Sarkar, Santanu; Dey, Prakash; Adhikari, Avishek; Maitra, Subhamoy: Probabilistic signature based generalized framework for differential fault analysis of stream ciphers (2017)
  2. Alhamdan, Ali; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho: Flaws in the initialisation process of stream ciphers (2015)
  3. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  4. Wang, Zhongxiao; Qi, Wenfeng; Tian, Tian: A note on determine the greatest common subfamily of two NFSRs by Gröbner basis (2015)
  5. Zhong, Jianghua; Lin, Dongdai: A new linearization method for nonlinear feedback shift registers (2015)
  6. Dunkelman, Orr; Keller, Nathan: Cryptanalysis of the stream cipher LEX (2013)
  7. Mansouri, Shohreh Sharif; Dubrova, Elena: An improved hardware implementation of the grain-128a stream cipher (2013)
  8. Isobe, Takanori; Ohigashi, Toshihiro; Morii, Masakatu: Slide cryptanalysis of lightweight stream cipher RAKAPOSHI (2012)
  9. Turan, Meltem Sönmez: On the nonlinearity of maximum-length NFSR feedbacks (2012)
  10. Wu, Hongjun; Huang, Tao; Nguyen, Phuong Ha; Wang, Huaxiong; Ling, San: Differential attacks against stream cipher ZUC (2012)
  11. Bogdanov, Andrey; Rechberger, Christian: A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN (2011)
  12. Tomecek, Jozef: Hardware optimizations of stream cipher Rabbit (2011)
  13. Babbage, Steve; Dodd, Matthew: The MICKEY stream ciphers (2008) ioport
  14. Dunkelman, Orr; Keller, Nathan: A new attack on the LEX stream cipher (2008)
  15. Lee, Jooyoung; Yeom, Yongjin: Efficient RFID authentication protocols based on pseudorandom sequence generators (2008)