2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5684215
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 50 publications
(40 citation statements)
references
References 15 publications
0
40
0
Order By: Relevance
“…The main idea is to use the linear relationship among the terms of the m-sequence {a i } generated by the LFSR to build the approximated linear relationship of the WG sequence s i = WG(a i ), i ≥ 0 (here the initialization process is ignored). Recall that, for W G(7, 23) in [5], the characteristic polynomial of the LFSR p(x) = x 23 + x 11 + β ∈ F 2 7 [x]. Two approximations of the linear equations used in [7] are listed below.…”
Section: A Distinguishing Attack On Wg(7 23)mentioning
confidence: 99%
See 2 more Smart Citations
“…The main idea is to use the linear relationship among the terms of the m-sequence {a i } generated by the LFSR to build the approximated linear relationship of the WG sequence s i = WG(a i ), i ≥ 0 (here the initialization process is ignored). Recall that, for W G(7, 23) in [5], the characteristic polynomial of the LFSR p(x) = x 23 + x 11 + β ∈ F 2 7 [x]. Two approximations of the linear equations used in [7] are listed below.…”
Section: A Distinguishing Attack On Wg(7 23)mentioning
confidence: 99%
“…Particularly, for the WG-7 cipher WG(7, 23) in [5], the characteristic polynomial p(x) = x 23 +x 11 +β ∈ F 2 7 [x], and the finite field F 2 7 is generated by the primitive polynomial x 7 +x+1 over F 2 .…”
Section: Description Of Wg Ciphermentioning
confidence: 99%
See 1 more Smart Citation
“…The stream ciphers based on LFSRs and non-linear filters have attracted a lot of attention resulting in a large number of publications. For instance, works [23,3,20] present designs of stream ciphers using non-linear filters of linear sequences. Their security is analysed in [14,26,24].…”
Section: Description Of Lf-nlfsrmentioning
confidence: 99%
“…For example, the KATAN/KTANTAN families of block ciphers [5], a lightweight stream cipher WG-7 [17], and the authenticated encryption algorithm Hummingbird-2 [10] are devised specifically for constrained environments. The block cipher PRINTcipher [16] is designed to be compact enough for integrated circuit printing.…”
Section: Introductionmentioning
confidence: 99%