메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages 865-868

On wireless communications privacy and security evaluation of encryption techniques

Author keywords

[No Author keywords available]

Indexed keywords

ENCRYPTION TECHNIQUE; PRIVACY AND SECURITY; WIRELESS COMMUNICATIONS;

EID: 0009792703     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2002.993383     Document Type: Conference Paper
Times cited : (13)

References (18)
  • 2
    • 4944232157 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Toronto, Canada Aug, Workshop Record
    • S. Fluhrer, I. Mantin and A. Shamir, Weaknesses in the key scheduling algorithm of RC4, Selected Areas in Cryptography-SAC2001, Toronto, Canada, Aug. 2001, Workshop Record, pp. 3-25.
    • (2001) Selected Areas in Cryptography-SAC2001 , pp. 3-25
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 3
    • 84937419430 scopus 로고    scopus 로고
    • Cryptanalytic time memory data tradeoffs for stream ciphers, advances in cryptology-Asiacrypt2000
    • A. Biryukov and A. Shamir, Cryptanalytic Time Memory Data tradeoffs for stream ciphers, Advances in Cryptology-ASIACRYPT2000, Lecture Notes in Computer Science, vol. 1976, pp. 1-13, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 1-13
    • Biryukov, A.1    Shamir, A.2
  • 4
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5, advances in cryptology-Eurocrypt2000
    • A. Canteaut and M. Trabbia, Improved fast correlation attacks using parity-check equations of weight 4 and 5, Advances in Cryptology-EUROCRYPT2000, Lecture Notes in Computer Science, vol. 1807, pp. 573-588, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 5
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers, fast software encryption 2000
    • V.V. Chepyzhov, T. Johansson and B. Smeets, A simple algorithm for fast correlation attacks on stream ciphers, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 180-195, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 180-195
    • Chepyzhov, V.V.1    Johansson, T.2    Smeets, B.3
  • 6
    • 23044522176 scopus 로고    scopus 로고
    • Cryptrec project-Cryptographic evaluation project for japanese Electronic government, invited talk at asiacrypt 2000
    • kyoto, japan Dec. 3-7 2000
    • H. Imai and A. Yamagishi, CRYPTREC Project-Cryptographic Evaluation Project for Japanese Electronic Government, invited talk at ASIACRYPT2000, Kyoto, Japan, Dec. 3-7, 2000, Lecture Notes in Computer Science, vol. 1976, pp. 399-400, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 399-400
    • Imai, H.1    Yamagishi, A.2
  • 8
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials, advances in cryptology-Crypto 2000
    • T. Johansson and F. Jonsson, Fast correlation attacks through reconstruction of linear polynomials, Advances in Cryptology-CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 300-315, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 300-315
    • Johansson, T.1    Jonsson, F.2
  • 9
    • 0024012644 scopus 로고
    • An introduction to contemporary cryptology
    • May
    • J.L. Massey, An introduction to contemporary cryptology, Proceedings of the IEEE, vol. 76, pp. 534-549, May 1988.
    • (1988) Proceedings of the IEEE , vol.76 , pp. 534-549
    • Massey, J.L.1
  • 12
    • 79960796465 scopus 로고    scopus 로고
    • Fast correlation attack algorithm with the list decoding and an application
    • Yokohama, Japan April, Preproceedings also Lecture Notes in Computer Science, in print
    • M. J. Mihaljevíc, M.P.C. Fossorier and H. Imai, Fast correlation attack algorithm with the list decoding and an application, Fast Software Encryption Workshop-FSE2001, Yokohama, Japan, April 2001, Preproceedings, pp. 208-222 (also Lecture Notes in Computer Science, in print).
    • (2001) Fast Software Encryption Workshop-FSE2001 , pp. 208-222
    • Mihaljevíc, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 13
    • 84974727960 scopus 로고    scopus 로고
    • A low-complexity and high-performance algorithm for the fast correlation attack, fast software encryption 2000
    • M. J. Mihaljevíc, M. P. C. Fossorier and H. Imai, A low-complexity and high-performance algorithm for the fast correlation attack, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 196-212
    • Mihaljevíc, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 14
    • 0035311895 scopus 로고    scopus 로고
    • On decoding techniques for cryptanalysis of certain encryption algorithms
    • April
    • M. J. Mihaljevíc, M. P. C. Fossorier and H. Imai, On decoding techniques for cryptanalysis of certain encryption algorithms, IEICE Trans. Fundamentals, vol. E84-A, pp. 919-930, April 2001.
    • (2001) IEICE Trans. Fundamentals , vol.84 , pp. 919-930
    • Mihaljevíc, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 15
    • 0034269942 scopus 로고    scopus 로고
    • A method for convergence analysis of iterative probabilistic decoding
    • Sept
    • M. J. Mihaljevíc and J. Golíc, A method for convergence analysis of iterative probabilistic decoding, IEEE Transactions on Information Theory, vol. 46, pp. 2206-2211, Sept. 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 2206-2211
    • Mihaljevíc, M.J.1    Golíc, J.2
  • 17
    • 84890522850 scopus 로고
    • Communication theory of secret systems
    • C.E. Shannon, Communication theory of secret systems, Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.