Shi, Tao; Anashin, Vladimir; Lin, Dongdai Fast evaluation of T-functions via time-memory trade-offs. (English) Zbl 1290.94131 Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 263-275 (2013). Summary: We present two low time-cost methods to evaluate arbitrary T-function on \(k\)-bit words; both methods use only fast computer instructions (integer addition and/or bitwise logical instructions) and calls to memory. The methods can be applied in a design of T-function-based stream ciphers for fast encryption software in heavy-traffic networks.For the entire collection see [Zbl 1263.94006]. Cited in 3 Documents MSC: 94A60 Cryptography 11T71 Algebraic coding theory; cryptography (number-theoretic aspects) PDFBibTeX XMLCite \textit{T. Shi} et al., Lect. Notes Comput. Sci. 7763, 263--275 (2013; Zbl 1290.94131) Full Text: DOI