The MICKEY Stream Ciphers. The family of stream ciphers MICKEY (which stands for Mutual Irregular Clocking KEYstream generator) is aimed at resource-constrained hardware platforms. It is intended to have low complexity in hardware, while providing a high level of security. It uses irregular clocking of shift registers, with some novel techniques to balance the need for guarantees on period and pseudorandomness against the need to avoid certain cryptanalytic attacks.

References in zbMATH (referenced in 22 articles )

Showing results 1 to 20 of 22.
Sorted by year (citations)

1 2 next

  1. Tan, Lin; Zhu, Xuanyong; Qi, Wenfeng: Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles (2021)
  2. Wang, Zhongxiao; Wang, Xiangyu; Tian, Tian: Constructing de Bruijn sequences based on a new necessary condition (2020)
  3. Wang, Zhongxiao; Zheng, Qunxiong; Qi, Wenfeng: The cycle structure of (\mathrmNFSR(f^d)) and its applications (2020)
  4. Dey, Sabyasachi; Roy, Tapabrata; Sarkar, Santanu: Some results on Fruit (2019)
  5. Gao, Bo; Liu, Xuan; Lan, Zhongzhou; Fu, Rongrong: A novel method for reconstructing period with single input in NFSR (2018)
  6. Hamann, Matthias; Krause, Matthias; Meier, Willi; Zhang, Bin: Design and analysis of small-state grain-like stream ciphers (2018)
  7. Sarkar, Santanu; Dey, Prakash; Adhikari, Avishek; Maitra, Subhamoy: Probabilistic signature based generalized framework for differential fault analysis of stream ciphers (2017)
  8. Alhamdan, Ali; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho: Flaws in the initialisation process of stream ciphers (2015)
  9. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  10. Wang, Zhongxiao; Qi, Wenfeng; Tian, Tian: A note on determine the greatest common subfamily of two NFSRs by Gröbner basis (2015)
  11. Zhong, Jianghua; Lin, Dongdai: A new linearization method for nonlinear feedback shift registers (2015)
  12. Dunkelman, Orr; Keller, Nathan: Cryptanalysis of the stream cipher LEX (2013)
  13. Mansouri, Shohreh Sharif; Dubrova, Elena: An improved hardware implementation of the grain-128a stream cipher (2013)
  14. Isobe, Takanori; Ohigashi, Toshihiro; Morii, Masakatu: Slide cryptanalysis of lightweight stream cipher RAKAPOSHI (2012)
  15. Turan, Meltem Sönmez: On the nonlinearity of maximum-length NFSR feedbacks (2012)
  16. Wu, Hongjun; Huang, Tao; Nguyen, Phuong Ha; Wang, Huaxiong; Ling, San: Differential attacks against stream cipher ZUC (2012)
  17. Bogdanov, Andrey; Rechberger, Christian: A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN (2011)
  18. Tomecek, Jozef: Hardware optimizations of stream cipher Rabbit (2011)
  19. Stankovski, Paul: Greedy distinguishers and nonrandomness detectors (2010)
  20. Lee, Jooyoung; Yeom, Yongjin: Efficient RFID authentication protocols based on pseudorandom sequence generators (2009)

1 2 next