Paper 2017/289
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Matthias Krause
Abstract
Time-Memory-Data tradeoff attacks (TMD-attacks) like those of Babbage, Biryukov and Shamir, and Dunkelman and Keller reduce the security level of keystream generator based-stream ciphers to
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Stream CiphersTime-Memory-Data Tradeoff AttacksSecurity Lower Bound ProofsRandom Oracle Models
- Contact author(s)
- krause @ uni-mannheim de
- History
- 2017-04-03: received
- Short URL
- https://ia.cr/2017/289
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/289, author = {Matthias Krause}, title = {On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/289}, year = {2017}, url = {https://eprint.iacr.org/2017/289} }