List of Papers
On this page, you can find a list of all papers that have been submitted to the ECRYPT Stream Cipher Project. If you want to refer to a paper on the ECRYPT Stream Cipher Project, please do so as in the following example:
@misc{Anashin:Bogdanov:Kizhvatov:Kumar:05, author = {Vladimir Anashin and Andrey Bogdanov and Ilya Kizhvatov and Sandeep Kumar}, title = {{ABC}: A New Fast Flexible Stream Cipher}, howpublished = {{eSTREAM}, {ECRYPT} Stream Cipher Project, Report 2005/001}, year = {2005}, note = {\url{http://www.ecrypt.eu.org/stream}}, }
- 2008/017 D. Stefan and C. Mitchell, "On the Parallelization of the MICKEY-128 2.0 Stream Cipher", pdf, In Proc. of the ECRYPT State of the Art of Stream Ciphers, Lausanne, Switzerland, Feb. 2008, pp. 175-186.
- 2008/016 Orr Dunkelman and Nathan Keller, "A New Attack on the LEX Stream Cipher", pdf, submitted 2008-06-09.
- 2008/015 Haina Zhang and Xiaoyun Wang, "Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4", pdf, submitted 2008-03-03.
- 2008/014 Eli Biham and Jennifer Seberry, "The Truth on TPy", pdf, submitted 2008-02-29.
- 2008/013 Daniel J. Bernstein, "Which phase-3 eSTREAM ciphers provide the best software speeds?", pdf, submitted 2008-02-25, updated 2008-03-31.
- 2008/012 Tor E. Bjorstad, "Cryptanalysis of Grain using Time/Memory/Date Tradeoffs", pdf, submitted 2008-02-25.
- 2008/011 Daniel J. Bernstein, "Response to 'On the Salsa20 core function'", pdf, submitted 2008-02-24.
- 2008/010 Daniel J. Bernstein, "Which eSTREAM ciphers have been broken?", pdf, submitted 2008-02-21, updated 2008-03-30.
- 2008/009 Carmi Gressel, Avi Hecht, Michael Rivkin, and Ran Granot, "The ZK-Crypt Noise Generator Design Parameter Emulator", pdf, submitted 2008-02-08.
- 2008/008 Carmi Gressel, Gregory Bard, Orr Dunkelman, Avi Hecht and Ran Granot, "The A to Z GUIDE to the ZK-Crypt", pdf, submitted 2008-02-08.
- 2008/007 Carmi Gressel, Avi Hecht and Ran Granot, "What the Host Sees in the ZK-Crypt", pdf, submitted 2008-02-08.
- 2008/006 Gregory Bard, Carmi Gressel, and Avi Hecht, "Security Analysis of the ZK-Crypt III Stream Cipher and Data Authenticator Against Algebraic Cryptanalytic, Differential & Correlation Attacks", pdf, appendices in pdf, submitted 2008-02-08.
- 2008/005 Carmi Gressel, Gregory Bard, Orr Dunkelman, Avi Hecht, and Ran Granot, "ZK-Crypt Dual Track FB Circuit & Concept Drawings", pdf, submitted 2008-02-08.
- 2008/004 Avi Hecht, Gregory Bard, and Carmi Gressel, "An Expanded ZK-Crypt III Security Analysis", pdf, submitted 2008-02-08.
- 2008/003 Avi Hecht, Carmi Gressel, and Ran Granot, "The ZK-Crypt III Algorithmic Specification", pdf, submitted 2008-02-08.
- 2008/002 Carmi Gressel, Orr Dunkelman, and Avi Hecht, "Understanding the ZK-Crypts -- Ciphers for (almost) all Reasons", pdf, submitted 2008-02-08.
- 2008/001 Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha and Dipanwita RoyChowdhury, "Strengthening NLS Against Crossword Puzzle Attack", pdf, submitted 2008-01-30.
- 2007/045 An-Ping Li, "A generic attack to ciphers", pdf, submitted 2007-10-09.
- 2007/044 Martin Hell and Thomas Johansson, "A Key Recovery Attack on Edon80", pdf, submitted 2007-09-25.
- 2007/043 Tor E. Bjørstad, "A note on the Edon80 S-box", pdf, submitted 2007-09-14.
- 2007/042 Cees J.A. Jansen, Alexander Kholosha and Tor Helleseth, "A Lightweight Implementation of the Pomaranch S-Box", pdf, submitted 2007-07-12.
- 2007/041 Rainer Göttfert, Berndt M. Gammel, "On the frame length of Achterbahn-128/80", pdf, submitted 2007-05-11.
- 2007/040 Cameron McDonald, Chris Charnes and Josef Pieprzyk, "Attacking Bivium with MiniSat", pdf, submitted 2007-04-24.
=========Papers submitted during phase 2 below this line=======
- 2007/039 An-Ping Li, "A NEW TYPE OF CIPHER: DICING_CSB", pdf, submitted 2007-02-05.
- 2007/038 Eli Biham and Jennifer Seberry, "Tweaking the IV Setup of the Py Family of Stream Ciphers -- The Ciphers TPy, TPypy, and TPy6", ps, submitted 2007-01-25.
- 2007/037 Gautham Sekar, Souradyuti Paul and Bart Preneel, "Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy", pdf, submitted 2007-03-09.
- 2007/036 Souradyuti Paul and Bart Preneel, "On the (In)security of Stream Ciphers Based on Arrays and Modular Addition", pdf, submitted 2007-03-09.
- 2007/035 (SASC 2007) Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado and Masakatu Morii, "How to Break Py and Pypy by a Chosen-IV Attack", pdf, submitted 2007-01-02.
- 2007/034 (SASC 2007) Hongjun Wu and Bart Preneel, "Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ", pdf, submitted 2007-01-02.
- 2007/033 (SASC 2007) Jean-Philippe Aumasson, "On a bias of Rabbit", pdf, submitted 2007-01-02.
- 2007/032 (SASC 2007) Milan Vojvoda, Marek Sys and Matus Jokay, "A Note on Algebraic Properties of Quasigroups in Edon80", pdf, submitted 2007-01- 02.
- 2007/031 (SASC 2007) Danilo Gligoroski and Svein Johan Knapskog, "Adding MAC functionality to Edon80", pdf, submitted 2007-01-02.
- 2007/030 (SASC 2007) Nathan Keller, Stephen D. Miller, Ilya Mironov and Ramarathnam Venkatesan, "MV3: A new word based stream cipher using rapid mixing and revolving buffers", pdf, submitted 2007-01-02.
- 2007/029 (SASC 2007) Shinsaku Kiyomoto, Toshiaki Tanaka and Kouichi Sakurai, "A Word- Oriented Stream Cipher Using Clock Control", pdf, submitted 2007-01-02.
- 2007/028 (SASC 2007) Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura and Mariko Hagita, "CryptMT Stream Cipher Version 3", pdf, submitted 2007-01-02.
- 2007/027 (SASC 2007) Martin Feldhofer, "Comparison of Low-Power Implementations of Trivium and Grain", pdf, submitted 2007-01-02.
- 2007/026 (SASC 2007) Kris Gaj, Gabriel Southern and Ramakrishna Bachimanchi, "Comparison of hardware performance of selected Phase II eSTREAM candidates", pdf, submitted 2007-01-02.
- 2007/025 (SASC 2007) Marcin Rogawski, "Hardware evaluation of eSTREAM Candidates: Grain, Lex, Mickey128, Salsa20 and Trivium", pdf, submitted 2007-01-02.
- 2007/024 (SASC 2007) Philippe Bulens, Kassem Kalach, Francois-Xavier Standaert and Jean -Jacques Quisquater, "FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile", pdf, submitted 2007-01-02.
- 2007/023 (SASC 2007) T. Good and M. Benaissa, "Hardware results for selected stream cipher candidates", pdf, submitted 2007-01-02.
- 2007/022 (SASC 2007) Francois Arnault, Thierry P. Berger and Marine Minier, "On the security of FCSR-based pseudorandom generators", pdf, submitted 2007-01-02.
- 2007/021 (SASC 2007) Antoine Joux and Jean-Rene Reinhard, "Overtaking VEST", pdf, submitted 2007-01-02.
- 2007/020 (SASC 2007) Berndt Gammel, Rainer Gottfert and Oliver Kniffler, "Achterbahn- 128/80: Design and Analysis", pdf, submitted 2007-01-02.
- 2007/019 (SASC 2007) Maria Naya-Plasencia, "Cryptanalysis of Achterbahn-128/80", pdf, submitted 2007-01-02.
- 2007/018 (SASC 2007) Cedric Lauradoux, "Throughput/code size trade-off for stream ciphers", pdf, submitted 2007-01-02.
- 2007/017 (SASC 2007) Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust and Christof Paar, "Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers", pdf, submitted 2007-01-02.
- 2007/016 (SASC 2007) Patrick Schaumont and Ingrid Verbauwhede, "Hardware/software codesign for stream ciphers", pdf, submitted 2007-01-02.
- 2007/015 (SASC 2007) Daniel J. Bernstein, "Cycle counts for authenticated encryption", pdf, submitted 2007-01-02.
- 2007/014 (SASC 2007) Wieland Fischer, Berndt M. Gammel, Oliver Kniffler and Joachim Velten, "Differential Power Analysis of Stream Ciphers", pdf, submitted 2007-01-02.
- 2007/013 (SASC 2007) Hakan Englund, Martin Hell and Thomas Johansson, "A Note on Distinguishing Attacks", pdf, submitted 2007-01-02.
- 2007/012 (SASC 2007) Iain Devlin and Alan Purvis, "Assessing the Security of Key Length", pdf, submitted 2007-01-02.
- 2007/011 (SASC 2007) Sondre Ronjom and Tor Helleseth, "Attacking the Filter Generator over $GF(2^m)$", pdf, submitted 2007-01-02.
- 2007/010 (SASC 2007) Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki and Hiroki Nakashima, "Differential Cryptanalysis of Salsa20/8", pdf, submitted 2007-01-02.
- 2007/009 (SASC 2007) Steve Babbage, Carlos Cid, Norbert Pramstaller and Havard Raddum, "Cryptanalysis of Hermes8F", pdf, submitted 2007-01-02.
- 2007/008 (SASC 2007) Meltem Sonmez Turan and Orhun Kara, "Linear Approximations for 2- round Trivium", pdf, submitted 2007-01-02.
- 2007/007 (SASC 2007) Steve Babbage, "Some thoughts on Trivium", pdf, submitted 2007-01-02.
- 2007/006 (SASC 2007) Alexander Maximov and Alex Biryukov, "Two Trivial Attacks on Trivium", pdf, submitted 2007-01-02.
- 2007/005 Milan Vojvoda, Marek Sys and Matus Jokay , "A Note on Algebraic Properties of Quasigroups in Edon80", pdf, submitted 2007-02-07.
- 2007/004 Maria Naya-Plasencia, "Cryptanalysis of Achterbahn-128/80 with a new keystream limitation", pdf, submitted 2007-02-05.
- 2007/003 Alexander Maximov and Alex Biryukov, "Two Trivial Attacks on Trivium", pdf, submitted 2007-01-23.
- 2007/002 Joo Yeon Cho and Josef Pieprzyk, "An Improved Distinguisher for Dragon", pdf, submitted 2007-01-05, updated 2007-07-09.
- 2007/001 Hakan Englund, Martin Hell, and Thomas Johansson, "Two General Attacks on Pomaranch-like Keystream Generators", pdf, submitted 2007-01-03.
- 2006/060 Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii, "How to Break Py and Pypy by a Chosen-IV Attack", pdf, submitted 2006-12-28, updated 2007-01-19.
- 2006/059 Paris Kitsos, "On the Hardware Implementation of the MICKEY-128 Stream Cipher", pdf, submitted 2006-12-09, updated 2006-12-20.
- 2006/058 Jean-Philippe Aumasson, "On a bias of Rabbit", pdf, submitted 2006-12-04, updated 2007-02-05.
- 2006/057 Markus Kasper, Sandeep Kumar, Kerstin Lemke-Rust and Christof Paar, "A Compact Implementation of Edon80", pdf, submitted 2006-11-30.
- 2006/056 Hongjun Wu and Bart Preneel, "Differential-Linear Attacks against the Stream Cipher Phelix", pdf, submitted 2006-11-26, updated 2006-12-12.
- 2006/055 Maria Naya Plasencia, "Cryptanalysis of Achterbahn-128/80", pdf, submitted 2006-11-20.
- 2006/054 Martin Hell and Thomas Johansson, "Cryptanalysis of Achterbahn-128/80", pdf, submitted 2006-11-20, updated 2007-05-08.
- 2006/053 Yaser Esmaeili Salehani and Hadi Ahmadi, "A Chosen-key Distinguishing Attack on Phelix", submitted 2006-10-04, withdrawn 2006-10-14.
- 2006/052 Hongjun Wu and Bart Preneel, "Key Recovery Attack on Py and Pypy with Chosen IVs", pdf, submitted 2006-09-05.
- 2006/051 Joo Yeon Cho and Josef Pieprzyk, "Crossword Puzzle Attack on NLSv2", pdf, submitted 2006-09-04, updated 2006-11-29.
- 2006/050 Hongjun Wu and Bart Preneel, "Attacking the IV Setup of Py and Pypy", pdf, submitted 2006-08-26, updated 2006-08-29.
- 2006/049 Haina Zhang, Lin Li and Xiaoyun Wang, "Fast Correlation Attack on Stream Cipher ABC v3", pdf, submitted 2006-08-18.
- 2006/048 Steve Babbage, Carlos Cid, Norbert Pramstaller and Havard Raddum, "Cryptanalysis of Hermes8F", pdf, submitted 2006-08-11.
- 2006/047 Cameron McDonald and Philip Hawkes, "On Exploiting Adjacent Bits in NLS", pdf, submitted 2006-08-09.
- 2006/046 Haina Zhang, Shaohui Wang and Xiaoyun Wang, "The Probability Advantages of Two Linear Expressions in Symmetric Ciphers", pdf, submitted 2006-08-03.
- 2006/045 Xiaoyun Wang, Meiqin Wang and Shaohui Wang, "Efficient Attack on the Stream Cipher LEX", submitted 2006-08-03, withdrawn 2006-08-04.
- 2006/044 Ozgul Kucuk, "Slide Resynchronization Attack on
the Initialization of Grain 1.0", ps, submitted 2006-07-16.
============Phase 1 papers below this line=========
- 2006/043 Meltem Sonmez Turan, Ali Doganaksoy, Cagdas Calik, "Detailed Statistical Analysis of Synchronous Stream Ciphers", pdf, submitted 2006-06-28.
- 2006/042 Martin Hell and Thomas Johansson, "Cryptanalysis of Achterbahn-Version 2", pdf, submitted 2006-05-22.
- 2006/041 Ulrich Kaiser and Bob Luckin, "The Search for the Anti-Bit", pdf, submitted 2006-04-01.
- 2006/039 Havard Raddum, "Cryptanalytic Results on Trivium", ps, submitted 2006-03-27.
- 2006/038 Eli Biham and Jennifer Seberry, "Pypy: Another Version of Py , pdf, submitted 2006-03-24.
- 2006/037 Alex Biryukov, "The Tweak for LEX-128, LEX-192, LEX-256", txt, submitted 2006-03-23.
- 2006/036 Philip Hawkes, Michael Paddon, Gregory G. Rose, and Miriam Wiggers de Vries, "Primitive Specification for NLSv2", pdf, submitted 2006-03-20.
- 2006/035 Anatoly Lebedev, Sergey Starodubtzev and Alexey Volchkov, "Real Distinguishing of Yamb Output and a True Random Sequence", pdf, submitted 2006-03-15.
- 2006/034 Li An-Ping,"Linear Approximating to Integer Addition", pdf, submitted 2006-03-15.
- 2006/033 Daniel J. Bernstein, "Does ZK-Crypt version 1 flunk a repetition test?", pdf, submitted 2006-03-02.
- 2006/032 Erik Zenner, "Stream Cipher Criteria", pdf, submitted 2006-02-28.
- 2006/031 Carmi Gressel, Orr Dunkelman, Ran Granot and Gabi Vago, "Enhanced ZK-Crypt", zip, submitted 2006-02-27.
- 2006/030 An-Ping Li, "A New MAC: LAMA", pdf, submitted 2006-02-24, updated 2006-03-02.
- 2006/029 Hongjun Wu and Bart Preneel, "Cryptanalysis of ABC v2", pdf, submitted 2006-02-22, updated 2006-06-09.
- 2006/028 Frank K. Gürkaynak and Peter Luethi, "Recommendations for Hardware Evaluation of Cryptographic Algorithms", pdf, submitted 2006-02-15.
- 2006/027 Berndt M. Gammel, Rainer Göttfert and Oliver Kniffler, "Status of Achterbahn and Tweaks", pdf, submitted 2006-01-02.
- 2006/026 Vladimir Anashin, Andrey Bogdanov and Ilya Kizhvatov, "Security and Implementation Properties of ABC v.2", pdf, submitted 2006-01-02.
- 2006/025 François Arnault, Thierry Berger and Cédric Lauradoux, "Update on F-FCSR Stream Cipher", pdf, submitted 2006-01-02.
- 2006/024 Dukjae Moon, Daesung Kwon, Daewan Han, Jooyoung Lee, Gwon Ho Ryu, Dong Wook Lee, Yongjin Yeom and Seongtaek Chee, "T-function based streamcipher TSC-4", pdf, submitted 2006-01-02.
- 2006/023 Makoto Matsmoto, Mutsuo Saito, Takuji Nishimura and Mariko Hagita, "CryptMT version 2.0 : A Large State Generator with Faster Initialization", pdf, submitted 2006-01-02.
- 2006/022, Danilo Gligoroski, Smile Markovski and Svein Johan Knapskog, "On periods of Edon-(2m; 2k) Family of Stream Ciphers", pdf, submitted 2006-01-02.
- 2006/021 Christophe De Cannière and Bart Preneel, "Trivium - A Stream Cipher Construction Inspired by Block Cipher Design Principle", pdf, submitted 2006-01-02.
- 2006/020 Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo and Maki Shigeri, "Cryptanalysis of Mir-1, a T-function Based Stream Cipher", pdf, submitted 2006-01-02.
- 2006/019 Côme Berbain, Henri Gilbert and Alexander Maximov, "Cryptanalysis of Grain", pdf, submitted 2006-01-02.
- 2006/018 Joo Yeon Cho and Josef Pieprzyk, "Linear Distinguishing Attack on NLS", pdf, submitted 2006-01-02.
- 2006/017 John Mattsson, "A Guess-and-Determine Attack on the Stream Cipher Polar Bear", pdf, submitted 2006-01-02.
- 2006/016 Tim Good, William Chelton and Mohamed Benaissa, "Review of stream cipher candidates from a low resource hardware perspective", pdf, submitted 2006-01-02.
- 2006/015 Frank K. Gürkaynak, Peter Luethi, Nico Bernold, René Blattmann, Victoria Goode, Marcel Marghitola, Hubert Kaeslin, Norbert Felber and Wolfgang Fichtner, "Hardware Evaluation of eSTREAM Candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, Trivium, VEST, ZK-Crypt", pdf, submitted 2006-01-02.
- 2006/014 Lejla Batina, Sandeep Kumar, Joseph Lano, Kirstin Lemke, Nele Mentens, Christof Paar, Bart Preneel, Kazuo Sakiyama and Ingrid Verbauwhede, "Testing Framework for eSTREAM Profile II Candidates", pdf, submitted 2006-01-02.
- 2006/013 Markku-Juhani O. Saarinen, "Chosen-IV Statistical Attacks on eSTREAM Stream Ciphers", pdf, submitted 2006-01-02.
- 2006/012 Meltem Sonmez Turan, Ali Doganaksoy, Cagdas Calik, "Statistical Analysis of Synchronous Stream Ciphers", pdf, submitted 2006-01-02.
- 2006/011 Daniel J. Bernstein, "Comparison of 256-bit stream ciphers at the beginning of 2006", pdf, submitted 2006-01-02.
- 2006/010 Paul Crowley, "Improved cryptanalysis of Py", pdf, submitted 2006-01-02.
- 2006/009 Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Tomoyasu Suzaki, Hadi Ahmadi, Taraneh Eghlidos and Shahram Khazaei, "Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks", pdf, submitted 2006-01-02.
- 2006/008 Tor Helleseth, Cees J.A. Jansen and Alexander Kholosha, "Pomaranch - Design and Analysis of a Family of Stream Ciphers", pdf, submitted 2006-01-02.
- 2006/007 Daniel J. Bernstein, "Salsa20/8 and Salsa20/12", pdf, submitted 2006-02-08.
- 2006/006 Cees J.A. Jansen, Tor Helleseth and Alexander Kholosha, "Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher (Version 2)", pdf, submitted 2006-02-07.
- 2006/005 Markku-Juhani O. Saarinen, "Chosen-IV Statistical Attacks on eSTREAM Stream Ciphers", pdf, submitted 2006-02-05.
- 2006/004 Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert, "DECIM v2", pdf, submitted 2006-01-30.
- 2006/003 Li An-Ping, "A New Version of the Cipher DICING", pdf, submitted 2006-01-18.
- 2006/002 Nicolas Courtois, "Cryptanalysis of Sfinks", pdf, submitted 2006-01-10.
- 2006/001 Rade Vuckovac, "MAG Cipher Design Notes", pdf, submitted 2006-01-02.
- 2005/085 Hadi Ahmadi, Taraneh Eghlidos and Shahram Khazaei "Improved Guess and Determine Attack on SOSEMANUK", pdf, submitted 2005-12-25.
- 2005/084 Mahdi Hasanzadeh, Elham Shakour and Shahram Khazaei, "Improved Cryptanalysis of Polar Bear", pdf, submitted 2005-12-24.
- 2005/083 Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura and Mariko Hagita, "Cryptanalysis of CryptMT: Effect of Huge Prime Period and Multiplicative Filter", pdf, submitted 2005-12-20.
- 2005/082 Mahdi Hasanzadeh, Shahram Khazaei and Alexander Kholosha, "On IV Setup of Pomaranch", pdf, submitted 2005-12-11.
- 2005/081 Souradyuti Paul, Bart Preneel and Gautham Sekar, "Distinguishing Attacks on the Stream Cipher Py", pdf, submitted 2005-12-07, updated 2006-02-22.
- 2005/080 Shahram Khazaei and Elham Shakour, "Distinguishing Attack on CryptMT", submitted 2005-11-26, withdrawn 2006-11-14.
- 2005/079 Vladimir Anashin, Andrey Bogdanov and Ilya Kizhvatov, "ABC Is Safe And Sound", pdf, submitted 2005-11-16.
- 2005/078 Benjamin Gittins, Howard Landman, Sean O'Neil and Ron Kelson, "A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in relation to AES, SHA-256 and SHA-512", pdf, submitted 2005-11-15.
- 2005/077 Sean O'Neil, Benjamin Gittins, "The Authenticated Encryption Mode of VEST Ciphers", pdf, C-code, submitted 2005-11-01.
- 2005/076 Alexey Lubkin and Boris Ryabko, "The distinguishing attack on ZK-Crypt cipher", pdf, submitted 2005-10-29.
- 2005/075 François Arnault, Thierry Berger and Cédric Lauradoux, "Preventing weaknesses on F-FCSR in IV mode and tradeoff attack on F-FCSR 8", pdf, submitted 2005-10-26.
- 2005/074 Cees Jansen and Alexander Kholosha, "Pomaranch is Sound and Healthy", pdf, submitted 2005-10-19.
- 2005/073 Paul Crowley, "Truncated differential cryptanalysis of five rounds of Salsa20", pdf, submitted 2005-10-17.
- 2005/072 Berndt Gammel, Rainer Gottfert and Oliver Kniffler, "Improved Boolean Combining Functions for Achterbahn", pdf, submitted 2005-10-14.
- 2005/071 Shahram Khazaei, Mehdi Hassanzadeh and Mohammad Kiaei, "Distinguishing Attack on Grain", pdf, submitted 2005-10-14.
- 2005/070 Cees Jansen and Alexander Kholosha, "Countering the Correlation Attack on Pomaranch", pdf, submitted 2005-10-13.
- 2005/069 Ed Dawson, Matt Henricksen, Willam Millan, and Leonie Simpson, "The Dragon Is Alive and Well", pdf, submitted 2005-10-12.
- 2005/068 Rade Vuckovac, "MAG alternating methods notes", pdf, submitted 2005-10-10.
- 2005/067 Li An-Ping, "Linear approximating for the Cipher Salsa20 (II)", pdf, submitted 2005-10-04.
- 2005/066 Daniel J. Bernstein, "Notes on the Salsa20 key size", pdf, submitted 2005-10-03.
- 2005/065 Shahram Khazaei, "Cryptanalysis of Pomaranch (CJCSG)", pdf, submitted 2005-10-02.
- 2005/064 Thomas Johansson, Willi Meier and Frédéric Muller, "Cryptanalysis of Achterbahn", pdf, submitted 2005-09-27.
- 2005/063 Shahram Khazaei and Mehdi Hassanzadeh, "Linear Sequential Circuit Approximation of the TRIVIUM Stream Cipher", pdf, submitted 2005-09-27.
- 2005/062 Hakan Englund and Alexander Maximov, "Attack the Dragon", pdf, submitted 2005-09-26.
- 2005/061 Shahram Khazaei and Mohammad Kiaei, "Distinguishing Attack on the ABC v.1 and v.2", submitted 2005-09-19, withdrawn 2006-11-14.
- 2005/060 Carlos Cid, Henri Gilbert and Thomas Johansson, "Cryptanalysis of Pomaranch", pdf, submitted 2005-09-12.
- 2005/059 Hongjun Wu and Bart Preneel, "Attacking the IV Setup of Stream Cipher LEX", pdf, submitted 2005-09-07.
- 2005/058 Daniel J. Bernstein, "Disproof of Li An-Ping's claims regarding Salsa20", pdf, submitted 2005-09-07.
- 2005/057 ECRYPT Network of Excellence, "eSTREAM - Update 1", pdf, submitted 2005-09-02.
- 2005/056 Li An-Ping, "Linear approximating for the Cipher Salsa20", pdf, submitted 2005-09-02.
- 2005/055 Jin Hong and Woo-Hwan Kim, "TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY", pdf, submitted 2005-08-05.
- 2005/054 Danilo Gligoroski, Smile Markovski, Ljupco Kocarev and Marjan Gusev, "Understanding Periods in Edon80", pdf, submitted 2005-07-29.
- 2005/053 Simon Künzli and Willi Meier, "Distinguishing Attack on MAG" pdf, submitted 2005-07-29.
- 2005/052 Shahram Khazaei, "Divide and Conquer Attack on ABC Stream Cipher", pdf, submitted 2005-07-26.
- 2005/051 Gilles Piret, "Practical Attacks on one Version of DICING", pdf, submitted 2005-07-20.
- 2005/050 Vladimir Anashin, Andrey Bogdanov and Ilya Kizhvatov "Increasing the ABC Stream Cipher Period", pdf, submitted 2005-07-13.
- 2005/049 Hongjun Wu and Bart Preneel, "Cryptanalysis of Stream Cipher DECIM", pdf, submitted 2005-07-18.
- 2005/048 Côme Berbain and Henri Gilbert, "Cryptanalysis of ABC", pdf, submitted 2005-07-12.
- 2005/047 Yassir Nawaz and Guang Gong, "Preventing Chosen IV Attack on WG Cipher by Increasing the Length of Key/IV Setup" pdf, submitted 2005-07-06.
- 2005/046 Eliane Jaulmes and Frédéric Muller, "Cryptanalysis of ECRYPT Candidates F-FCSR-8 and F-FCSR-H", ps, submitted 2005-07-05.
- 2005/045 Hongjun Wu and Bart Preneel, "Chosen IV Attack on Stream Cipher WG", pdf, submitted 2005-07-05.
- 2005/044 Joan Daemen, Joseph Lano and Bart Preneel, "Chosen Ciphertext Attack on SSS", pdf, submitted 2005-06-29.
- 2005/043 Hongjun Wu and Bart Preneel, "Distinguishing Attack on Stream Cipher Yamb", pdf, submitted 2005-06-22.
- 2005/042 Frédéric Muller and Thomas Peyrin, "Linear Cryptanalysis of TSC Stream Ciphers - Applications to the ECRYPT proposal TSC-3", ps, submitted 2005-06-20.
- 2005/041 Jin Hong, "Remarks on the Period of Edon80", pdf, submitted 2005-06-18.
- 2005/040 Christophe De Cannière, Joseph Lano and Bart Preneel, "Comments on the Rediscovery of Time Memory Data Tradeoffs", pdf, submitted 2005-04-29.
- 2005/039 Erik Zenner and Martin Boesgaard, "How Secure is Secure? On Message and IV Lengths for Synchronous Stream Ciphers", pdf, submitted 2005-04-29.
- 2005/038 Enes Pasalic, "On algebraic immunity of Maiorana-McFarland like functions and applications of algebraic attacks to some stream cipher schemes", pdf, submitted 2005-04-29.
- 2005/037 Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Maki Shigeri, Tomoyasu Suzaki, and Takeshi Kawabata, "The Most Efficient Distinguishing Attack on VMPC and RC4A", pdf, submitted 2005-04-29.
- 2005/036 Daniel J. Bernstein, "Understanding brute force", pdf, submitted 2005-04-29.
- 2005/035 Carmi Gressel, Ran Granot and Gabi Vago, "ZK-Crypt", zip, submitted 2005-04-29.
- 2005/034 LAN Crypto, "LAN Crypto Submission to the ECRYPT Stream Cipher Project." (yamb), pdf, submitted 2005-04-29.
- 2005/033 Guang Gong and Yassir Nawaz, "The WG Stream Cipher", pdf, submitted 2005-04-29.
- 2005/032 Sean O'Neil, Benjamin Gittins, Howard Landman, "VEST - Hardware-Dedicated Stream Ciphers", pdf, submitted 2005-04-29.
- 2005/031 Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han and Seongtaek Chee, "T-function Based Stream Cipher TSC-3", pdf, submitted 2005-04-29.
- 2005/030 Christophe De Cannière and Bart Preneel, "Trivium - A Stream Cipher Construction Inspired by Block Cipher Design Principles", pdf, submitted 2005-04-29.
- 2005/029 Timothy Brigham, "TRBDK3 YAEA - High Security, Synchronous Stream Cypher Implementable in Hardware and Software", ps, submitted 2005-04-29.
- 2005/028 Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries, "Primitive Specification for SSS", pdf, submitted 2005-04-29.
- 2005/027 Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert, "Sosemanuk, a fast software-oriented stream cipher", pdf, submitted 2005-04-29.
- 2005/026 An Braeken, Joseph Lano, Nele Mentens, Bart Preneel and Ingrid Verbauwhede, "SFINKS : A Synchronous Stream Cipher for Restricted Hardware Environments", ps, submitted 2005-04-29.
- 2005/025 Daniel Bernstein, "Salsa20", zip, submitted 2005-04-29.
- 2005/024 Martin Boesgaard, Mette Vesterager, Thomas Christensen and Erik Zenner, "The Stream Cipher Rabbit", pdf, submitted 2005-04-29.
- 2005/023 Eli Biham and Jennifer Seberry, "Py (Roo) : A Fast and Secure Stream Cipher Using Rolling Arrays", ps, submitted 2005-04-29.
- 2005/022 Cees Jansen and Alexander Kolosha, "Cascade Jump Controlled Sequence Generator (CJCSG)" (Pomaranch), pdf, submitted 2005-04-29.
- 2005/021 Johan Håstad and Mats Näslund, "The Stream Cipher Polar Bear", pdf, submitted 2005-04-29.
- 2005/020 Doug Whiting, Bruce Schneier, Stephan Lucks and Frédéric Muller, "Phelix - Fast Encryption and Authentication in a Single Cryptographic Primitive", pdf, submitted 2005-04-29.
- 2005/019 Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries, "Primitive Specification for NLS", pdf, submitted 2005-04-29.
- 2005/018 Joan Daemen and Paris Kitsos, "Submission to ECRYPT call for stream ciphers: the self-synchronizing stream cipher Mosquito", pdf, submitted 2005-04-29.
- 2005/017 Alexander Maximov, "A New Stream Cipher Mir-1", ps, submitted 2005-04-29.
- 2005/016 Steve Babbage and Matthew Dodd, "The stream cipher MICKEY-128 (version 1)", pdf, submitted 2005-04-29.
- 2005/015 Steve Babbage and Matthew Dodd, "The stream cipher MICKEY (version 1)", pdf, submitted 2005-04-29.
- 2005/014 Rade Vuckovac, "MAG My Array Generator (a new strategy for random number generation)", pdf, submitted 2005-04-29.
- 2005/013 Alex Biryukov, "A new 128 bit key stream cipher : LEX", pdf, submitted 2005-04-29.
- 2005/012 Ulrich Kaiser, "Hermes-8", pdf, submitted 2005-04-29.
- 2005/011 Hongjun Wu, "Stream Cipher HC-256", pdf, submitted 2005-04-29.
- 2005/010 Martin Hell, Thomas Johansson and Willi Meier, "Grain - A Stream Cipher for Constrained Environments", pdf, submitted 2005-04-29.
- 2005/009 Thierry Moreau, "The Frogbit Cipher, a Data Integrity Algorithm", zip, submitted 2005-04-29.
- 2005/008 Thierry Berger, François Arnault and Cédric Lauradoux, "F-FCSR", zip, submitted 2005-04-29.
- 2005/007 Danilo Gligoroski, Smile Markovski, Ljupco Kocarev and Marjan Gusev, "Edon80", zip, submitted 2005-04-29.
- 2005/006 Kevin Chen, Matt Henricksen, William Millan, Joanne Fuller, Leonie Simpson1, Ed Dawson, Hoonjae Lee and Sangjae Moon, "Dragon: A Fast Word Based Stream Cipher", pdf, submitted 2005-04-29.
- 2005/005 An-Ping Li, "A New Stream Cipher: Dicing", pdf, submitted 2005-04-29.
- 2005/004 Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert, "Decim - A New Stream Cipher for Hardware Applications", pdf, submitted 2005-04-29.
- 2005/003 Makoto Matsumoto, Hagita Mariko, Takuji Nishimura and Mutsuo Saito, "Mersenne Twister and Fubuki Stream/Block Cipher", pdf, submitted 2005-04-29.
- 2005/002 Berndt Gammel, Rainer Göttfert and Oliver Kniffler, "The Achterbahn Stream Cipher", pdf, submitted 2005-04-29.
- 2005/001 2005-04-29 Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov and Sandeep Kumar, "ABC : A New Fast Flexible Stream Cipher", pdf, submitted 2005-04-29.