Contents: Experimenting linear cryptanalysis Linear cryptanalysis using multiple linear approximations Linera attacks on stream ciphers Using tools from error correcting theory in linear cryptanalysis Correlation analysis in GF (2) Subject index Author index
Table of contents: 1. The eSTREAM Project 2. CryptMT3 Stream Cipher 3. The Dragon Stream Cipher: Design, Analysis, and Implementation Issues 4. The Stream Cipher HC-128 5. Design of a New Stream Cipher—LEX 6. Specification for NLSv2 7. The Rabbit Stream Cipher 8. The Salsa20 Family of Stream Ciphers 9. Sosemanuk, a Fast Software-Oriented Stream Cipher 10. eSTREAM Software Performanc…
CONTENTS: 1. Introduction. 2. Stream Ciphers. 3. Primes, Primitive Roots and Sequences. 4. Cyclotomy and Cryptographic Functions. 5. Special Primes and Sequences. 6. Highly Nonlinear Functions. 7. Difference Sets and Sequences. 8. Binary Cyclotomic Generators. 9. Analysis of Cyclotomic Generators of Order 2. 10. Nonbinary Cyclotomic Generators. 11. Generators Based on Permutations. …