-
2
-
-
4944232157
-
Weaknesses in the key scheduling algorithm of RC4
-
Toronto, Canada Aug, Workshop Record
-
S. Fluhrer, I. Mantin and A. Shamir, Weaknesses in the key scheduling algorithm of RC4, Selected Areas in Cryptography-SAC2001, Toronto, Canada, Aug. 2001, Workshop Record, pp. 3-25.
-
(2001)
Selected Areas in Cryptography-SAC2001
, pp. 3-25
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
3
-
-
84937419430
-
Cryptanalytic time memory data tradeoffs for stream ciphers, advances in cryptology-Asiacrypt2000
-
A. Biryukov and A. Shamir, Cryptanalytic Time Memory Data tradeoffs for stream ciphers, Advances in Cryptology-ASIACRYPT2000, Lecture Notes in Computer Science, vol. 1976, pp. 1-13, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
4
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5, advances in cryptology-Eurocrypt2000
-
A. Canteaut and M. Trabbia, Improved fast correlation attacks using parity-check equations of weight 4 and 5, Advances in Cryptology-EUROCRYPT2000, Lecture Notes in Computer Science, vol. 1807, pp. 573-588, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
5
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers, fast software encryption 2000
-
V.V. Chepyzhov, T. Johansson and B. Smeets, A simple algorithm for fast correlation attacks on stream ciphers, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 180-195, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 180-195
-
-
Chepyzhov, V.V.1
Johansson, T.2
Smeets, B.3
-
6
-
-
23044522176
-
Cryptrec project-Cryptographic evaluation project for japanese Electronic government, invited talk at asiacrypt 2000
-
kyoto, japan Dec. 3-7 2000
-
H. Imai and A. Yamagishi, CRYPTREC Project-Cryptographic Evaluation Project for Japanese Electronic Government, invited talk at ASIACRYPT2000, Kyoto, Japan, Dec. 3-7, 2000, Lecture Notes in Computer Science, vol. 1976, pp. 399-400, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 399-400
-
-
Imai, H.1
Yamagishi, A.2
-
8
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials, advances in cryptology-Crypto 2000
-
T. Johansson and F. Jonsson, Fast correlation attacks through reconstruction of linear polynomials, Advances in Cryptology-CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 300-315, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jonsson, F.2
-
9
-
-
0024012644
-
An introduction to contemporary cryptology
-
May
-
J.L. Massey, An introduction to contemporary cryptology, Proceedings of the IEEE, vol. 76, pp. 534-549, May 1988.
-
(1988)
Proceedings of the IEEE
, vol.76
, pp. 534-549
-
-
Massey, J.L.1
-
12
-
-
79960796465
-
Fast correlation attack algorithm with the list decoding and an application
-
Yokohama, Japan April, Preproceedings also Lecture Notes in Computer Science, in print
-
M. J. Mihaljevíc, M.P.C. Fossorier and H. Imai, Fast correlation attack algorithm with the list decoding and an application, Fast Software Encryption Workshop-FSE2001, Yokohama, Japan, April 2001, Preproceedings, pp. 208-222 (also Lecture Notes in Computer Science, in print).
-
(2001)
Fast Software Encryption Workshop-FSE2001
, pp. 208-222
-
-
Mihaljevíc, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
13
-
-
84974727960
-
A low-complexity and high-performance algorithm for the fast correlation attack, fast software encryption 2000
-
M. J. Mihaljevíc, M. P. C. Fossorier and H. Imai, A low-complexity and high-performance algorithm for the fast correlation attack, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 196-212
-
-
Mihaljevíc, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
14
-
-
0035311895
-
On decoding techniques for cryptanalysis of certain encryption algorithms
-
April
-
M. J. Mihaljevíc, M. P. C. Fossorier and H. Imai, On decoding techniques for cryptanalysis of certain encryption algorithms, IEICE Trans. Fundamentals, vol. E84-A, pp. 919-930, April 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.84
, pp. 919-930
-
-
Mihaljevíc, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
15
-
-
0034269942
-
A method for convergence analysis of iterative probabilistic decoding
-
Sept
-
M. J. Mihaljevíc and J. Golíc, A method for convergence analysis of iterative probabilistic decoding, IEEE Transactions on Information Theory, vol. 46, pp. 2206-2211, Sept. 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 2206-2211
-
-
Mihaljevíc, M.J.1
Golíc, J.2
-
17
-
-
84890522850
-
Communication theory of secret systems
-
C.E. Shannon, Communication theory of secret systems, Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
18
-
-
0035245921
-
Fast encryption for multimedia
-
Feb
-
X. Yi, C.H. Tan, C.K. Siew and M.R. Syed, Fast encryption for multimedia, IEEE Transactions on Consumer Electronics, vol. 47, pp. 101-107, Feb. 2001.
-
(2001)
IEEE Transactions on Consumer Electronics
, vol.47
, pp. 101-107
-
-
Yi, X.1
Tan, C.H.2
Siew, C.K.3
Syed, M.R.4
|