Bjørstad, T.E.: Cryptanalysis of grain using time/memory/data tradeoffs (2008). http://www.ecrypt.eu.org/stream
Boura, C., Canteaut, A.: On the influence of the algebraic degree of f\({}^{\text{-1 }}\) on the algebraic degree of G \(\circ \) F. IEEE Trans. Inf. Theory 59(1), 691–702 (2013)
MathSciNet
CrossRef
Google Scholar
Boura, C., Canteaut, A., De Cannière, C.: Higher-order differential properties of Keccak and Luffa. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 252–269. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21702-9_15
CrossRef
Google Scholar
Canteaut, A., Videau, M.: Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 518–533. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-7_34
CrossRef
Google Scholar
Ding, L., Jin, C., Guan, J., Zhang, S., Li, J., Wang, H., Zhao, W.: New state recovery attacks on the grain v1 stream cipher. China Commun. 13(11), 180–188 (2016)
CrossRef
Google Scholar
Fu, X., Wang, X., Dong, X., Meier, W.: A key-recovery attack on 855-round trivium. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 160–184. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_6
CrossRef
Google Scholar
Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1), 86–93 (2007)
CrossRef
Google Scholar
Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional differential cryptanalysis of NLFSR-based cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 130–145. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17373-8_8
CrossRef
Google Scholar
Liu, M.: Degree evaluation of NFSR-based cryptosystems. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10403, pp. 227–249. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63697-9_8
CrossRef
Google Scholar
Mihaljević, M.J., Gangopadhyay, S., Paul, G., Imai, H.: Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2), 55–64 (2012)
CrossRef
Google Scholar
Mihaljević, M.J., Sinha, N., Gangopadhyay, S., Maitra, S., Paul, G., Matsuura, K.: An improved cryptanalsis of lightweight stream cipher grain-v1. In: Cryptacus: Workshop and MC meeting (2017)
Google Scholar
Siddhanti, A.A., Maitra, S., Sinha, N.: Certain observations on ACORN v3 and grain v1–implications towards TMDTO attacks. J. Hardw. Syst. Secur. 3(1), 64–77 (2019)
CrossRef
Google Scholar
Ye, C., Tian, T.: Deterministic cube attacks: a new method to recover superpolies in practice. IACR Cryptology ePrint Archive 2018, 1082 (2018)
Google Scholar
Ye, C., Tian, T.: A new framework for finding nonlinear superpolies in cube attacks against trivium-like ciphers. In: Susilo, W., Yang, G. (eds.) ACISP 2018. LNCS, vol. 10946, pp. 172–187. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93638-3_11
CrossRef
Google Scholar
Zhang, B., Li, Z., Feng, D., Lin, D.: Near collision attack on the grain v1 stream cipher. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 518–538. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43933-3_27
CrossRef
Google Scholar
Zhang, B., Xu, C., Meier, W.: Fast near collision attack on the grain v1 stream cipher. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 771–802. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78375-8_25
CrossRef
Google Scholar