eSTREAM

Welcome to the home page of eSTREAM, the ECRYPT Stream Cipher Project. The eSTREAM project was a multi-year effort, running from 2004 to 2008, to promote the design of efficient and compact stream ciphers suitable for widespread adoption. As a result of the project, a portfolio of new stream ciphers was announced in April 2008. The eSTREAM portfolio was revised in September 2008, and currently contains seven stream ciphers. This website is dedicated to ciphers in this final portfolio. For information on the eSTREAM project and selection process, including a timetable of the project and further technical background, please visit the original eSTREAM Project website. ... The eSTREAM software testing framework page provides guidelines on how to write and submit optimized code for eSTREAM ciphers. Reports on portfolio ciphers’ performance in software can be found here. ...


References in zbMATH (referenced in 105 articles )

Showing results 1 to 20 of 105.
Sorted by year (citations)

1 2 3 4 5 6 next

  1. Dalai, Deepak Kumar; Pal, Santu; Sarkar, Santanu: A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a (2022)
  2. La Scala, Roberto; Tiwari, Sharwan K.: Stream/block ciphers, difference equations and algebraic attacks (2022)
  3. Huang, Zhenyu; Sun (c), Yao; Lin, Dongdai: On the efficiency of solving Boolean polynomial systems with the characteristic set method (2021)
  4. Jiao, Lin; Feng, Dengguo; Hao, Yonglin; Gong, Xinxin; Du, Shaoyu: FAN: a lightweight authenticated cryptographic algorithm (2021)
  5. Kumar, Arvind; Mishra, P. R.; Pal, S. K.; Ojjela, Odelu: Analysis of variability and degree of non-linearity of HC-128 (2021)
  6. Li, Yubo; Li, Kangquan; Mesnager, Sihem; Qu, Longjiang: More permutations and involutions for constructing bent functions (2021)
  7. Salam, Iftekhar; Law, Kim Young; Xue, Luxin; Yau, Wei-Chuen: Differential fault based key recovery attacks on TRIAD (2021)
  8. Zhong, Jianghua; Pan, Yingyin; Lin, Dongdai: On Galois NFSRs equivalent to Fibonacci ones (2021)
  9. Kamlovskiĭ, O. V.; Mizerov, V. V.: Properties of the output sequences of a combination generators over finite fields (2020)
  10. Kesarwani, Abhishek; Roy, Dibyendu; Sarkar, Santanu; Meier, Willi: New cube distinguishers on NFSR-based stream ciphers (2020)
  11. Mesnager, Sihem; Mandal, Bimal; Tang, Chunming: New characterizations and construction methods of bent and hyper-bent Boolean functions (2020)
  12. Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
  13. Kumar, Arvind; Pal, S. K.; Ojjela, Odelu: A heuristic approach towards variability of HC-128 (2019)
  14. Vuckovac, Rade: Secure and computationally efficient cryptographic primitive based on cellular automaton (2019)
  15. Zhang, Shiyong; Chen, Gongliang: New results on the state cycles of Trivium (2019)
  16. Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (2018)
  17. Cardell, Sara D.; Fúster-Sabater, Amparo; Ranea, Adrián H.: Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator (2018)
  18. Dravie, B.; Guillot, P.; Millérioux, G.: Flatness and structural analysis as a constructive framework for private communication (2018)
  19. Gao, Bo; Liu, Xuan; Lan, Zhongzhou; Fu, Rongrong: A novel method for reconstructing period with single input in NFSR (2018)
  20. Hamann, Matthias; Krause, Matthias: On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks (2018)

1 2 3 4 5 6 next