2023
DOI: 10.1007/s12095-023-00656-0
|View full text |Cite
|
Sign up to set email alerts
|

The welch-gong stream cipher - evolutionary path

N. Zidarič,
K. Mandal,
G. Gong
et al.

Abstract: This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has been a long journey that lead the WG stream ciphers to become practical. The evolutionary path is a combination of mathematical endeavour and engineering striving to transfer pure mathematical functions to practical encryption algorithms for various applications. This path began as the pioneering work on WG transformation sequences with 2-level autocorrelation, leading to important breakthroughs in the early 2000’s, such … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 64 publications
0
1
0
Order By: Relevance
“…In addition to the NIST lightweight cryptography standards, there are also lightweight ciphers that include error detection mechanisms that can detect errors in the ciphertext caused by transmission errors or fault attacks. For example, the WAGE stream cipher (Zidarič et al, 2023), the Camellia block cipher (Aoki et al, 2000), the Midori cipher (Banik et al, 2015), and the QARMA block cipher (Avanzi et al, 2023) all include error detection mechanisms.…”
Section: Overview For Post-quantum Cryptographymentioning
confidence: 99%
“…In addition to the NIST lightweight cryptography standards, there are also lightweight ciphers that include error detection mechanisms that can detect errors in the ciphertext caused by transmission errors or fault attacks. For example, the WAGE stream cipher (Zidarič et al, 2023), the Camellia block cipher (Aoki et al, 2000), the Midori cipher (Banik et al, 2015), and the QARMA block cipher (Avanzi et al, 2023) all include error detection mechanisms.…”
Section: Overview For Post-quantum Cryptographymentioning
confidence: 99%