-
1
-
-
84948981360
-
-
Fast Software Encryption'94, Lecture Notes in Computer Science, vol.1008, pp.137-143, 1995.
-
R.J. Anderson, "Searching for optimum correlation attack," Fast Software Encryption'94, Lecture Notes in Computer Science, vol.1008, pp.137-143, 1995.
-
"Searching for Optimum Correlation Attack,"
-
-
Anderson, R.J.1
-
2
-
-
0031366921
-
-
IEEE Trans. Comput., vol.46, pp.637-638, May 1997.
-
S.R. Blackburn, S. Murphy, and K.G. Peterson, "Comments on "Theory and applications of cellular automata in cryptography"," IEEE Trans. Comput., vol.46, pp.637-638, May 1997.
-
S. Murphy, and K.G. Peterson, "Comments on "Theory and Applications of Cellular Automata in Cryptography","
-
-
Blackburn, S.R.1
-
3
-
-
0012523847
-
-
IEEE Trans. Comput., vol.45, pp.782-792, 1996.
-
K. Cattell and J.C. Muzio, "Analysis of one-dimensional linear hybrid cellular automata over GF(q)," IEEE Trans. Comput., vol.45, pp.782-792, 1996.
-
And J.C. Muzio, "Analysis of One-dimensional Linear Hybrid Cellular Automata over GF(q),"
-
-
Cattell, K.1
-
4
-
-
85027117266
-
-
IEEE Press, New York, 1997.
-
P.P. Chaudhuri, D.R. Chaudhuri, S. Nandi, and S. Chattopadhyay, "Additive Cellular Automata: Theory and Applications," IEEE Press, New York, 1997.
-
D.R. Chaudhuri, S. Nandi, and S. Chattopadhyay, "Additive Cellular Automata: Theory and Applications,"
-
-
Chaudhuri, P.P.1
-
5
-
-
84974670663
-
-
Advances in Cryptology CRYPTO '93, Lecture Notes in Computer Science, vol.773, pp.22-39, 1994.
-
D. Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator," Advances in Cryptology CRYPTO '93, Lecture Notes in Computer Science, vol.773, pp.22-39, 1994.
-
H. Krawczyk, and Y. Mansour, "The Shrinking Generator,"
-
-
Coppersmith, D.1
-
6
-
-
84915939958
-
-
Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science, vol.434, pp.329-354, 1990.
-
P. Flajolet and A.M. Odlyzko, "Random mapping statistics," Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science, vol.434, pp.329-354, 1990.
-
And A.M. Odlyzko, "Random Mapping Statistics,"
-
-
Flajolet, P.1
-
7
-
-
84929185964
-
-
Advances in Cryptology EUROCRYPT'89, Lecture Notes in Computer Science, vol.434, pp.586-595, 1990.
-
R. Forre, "A fast correlation attack on nonlinearly filtered shift-register sequences," Advances in Cryptology EUROCRYPT'89, Lecture Notes in Computer Science, vol.434, pp.586-595, 1990.
-
"A Fast Correlation Attack on Nonlinearly Filtered Shift-register Sequences,"
-
-
Forre, R.1
-
8
-
-
85142993177
-
-
IEEE Trans. Inf. Theory, vol.36, pp.190-192, 1990.
-
J. Colic and M. Mihaljevic, "Minimal linear equivalent analysis of a variable memory binary sequences generator," IEEE Trans. Inf. Theory, vol.36, pp.190-192, 1990.
-
And M. Mihaljevic, "Minimal Linear Equivalent Analysis of a Variable Memory Binary Sequences Generator,"
-
-
Colic, J.1
-
9
-
-
0025824847
-
-
Journal of Cryptology, vol.3, pp.201-212, 1991.
-
J. Golic and M. Mihaljevic, "A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance," Journal of Cryptology, vol.3, pp.201-212, 1991.
-
And M. Mihaljevic, "A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance,"
-
-
Golic, J.1
-
10
-
-
84958983180
-
-
Fast Software Encryption '96, Lecture Notes in Computer Science, vol.1039, pp. 173-188, 199G.
-
J. Golic, "On the security of nonlinear filter generators," Fast Software Encryption '96, Lecture Notes in Computer Science, vol.1039, pp. 173-188, 199G.
-
"On the Security of Nonlinear Filter Generators,"
-
-
Golic, J.1
-
11
-
-
84957380512
-
-
Advances in Cryptology - EUROCRYPT'97, Lecture Notes in Computer Science, vol.1233, pp.226-238, 1997.
-
J. Golic, "Linear statistical weakness of alleged RC4 keystream generator," Advances in Cryptology - EUROCRYPT'97, Lecture Notes in Computer Science, vol.1233, pp.226-238, 1997.
-
"Linear Statistical Weakness of Alleged RC4 Keystream Generator,"
-
-
Golic, J.1
-
12
-
-
0032118172
-
-
IEEE Trans. Comput., vol.47, pp.788-801, 1998.
-
T. Ikenaga and T. Ogura, "CAM2: A highly-parallel twodimensional cellular automaton architecture," IEEE Trans. Comput., vol.47, pp.788-801, 1998.
-
And T. Ogura, "CAM2: a Highly-parallel Twodimensional Cellular Automaton Architecture,"
-
-
Ikenaga, T.1
-
13
-
-
0031235317
-
-
IEE Proc. - Comput. Digit. Tech., vol.144, pp.279-284, 1997.
-
C.K. Koc and A.M. Apohan, "Inversion of cellular automata iterations," IEE Proc. - Comput. Digit. Tech., vol.144, pp.279-284, 1997.
-
And A.M. Apohan, "Inversion of Cellular Automata Iterations,"
-
-
Koc, C.K.1
-
14
-
-
84955622043
-
-
Advances in Cryptology - ASIACRYPT '96, Lecture Notes in Computer Science, vol.1103, pp.360-367, 1996.
-
S. Lee, S. Chee, S. Park, and S. Park, "Conditional correlation attack on nonlinear filter generators," Advances in Cryptology - ASIACRYPT '96, Lecture Notes in Computer Science, vol.1103, pp.360-367, 1996.
-
S. Chee, S. Park, and S. Park, "Conditional Correlation Attack on Nonlinear Filter Generators,"
-
-
Lee, S.1
-
15
-
-
0002634717
-
-
Journal ACM, vol.12, pp.83-89, 19G8.
-
M.D. MacLaren and G. Marsaglia, "Uniform random number generators," Journal ACM, vol.12, pp.83-89, 19G8.
-
And G. Marsaglia, "Uniform Random Number Generators,"
-
-
MacLaren, M.D.1
-
16
-
-
85013632897
-
-
Advances in Cryptology - EUROCRYPT 91, Lecture Notes in Computer Science, vol.547, pp.186-189, 1992.
-
W. Meier and O. Staffelbach, "Analysis of pseudo random sequences generated by cellular automata," Advances in Cryptology - EUROCRYPT 91, Lecture Notes in Computer Science, vol.547, pp.186-189, 1992.
-
And O. Staffelbach, "Analysis of Pseudo Random Sequences Generated by Cellular Automata,"
-
-
Meier, W.1
-
17
-
-
84948963544
-
-
Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Computer Science, vol.950, pp.205-214, 1995.
-
W. Mcier and O. Staffelbach, "The self-shrinking generator," Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Computer Science, vol.950, pp.205-214, 1995.
-
And O. Staffelbach, "The Self-shrinking Generator,"
-
-
Mcier, W.1
-
18
-
-
84944878354
-
-
CRC Press, Boca Roton, 1997.
-
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, "Handbook of Applied Cryptography," CRC Press, Boca Roton, 1997.
-
P.C. Van Oorschot, and S.A. Vanstone, "Handbook of Applied Cryptography,"
-
-
Menezes, A.J.1
-
19
-
-
85028870469
-
-
Advances in Cryptology - AUSCRYPT '92, Lecture Notes in Computer Science, vol.718, pp.349-356, 1993.
-
M. Mihaljevic, "An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure," Advances in Cryptology - AUSCRYPT '92, Lecture Notes in Computer Science, vol.718, pp.349-356, 1993.
-
"An Approach to the Initial State Reconstruction of a Clock-controlled Shift Register Based on a Novel Distance Measure,"
-
-
Mihaljevic, M.1
-
20
-
-
84873998819
-
-
Advances in Cryptology - ASIACRYPT '94, Lecture Notes in Computer Science, vol.917, pp.67-79, 1995.
-
M. Mihaljevic, "A correlation attack on the binary sequence generators with time-varying output function," Advances in Cryptology - ASIACRYPT '94, Lecture Notes in Computer Science, vol.917, pp.67-79, 1995.
-
"A Correlation Attack on the Binary Sequence Generators with Time-varying Output Function,"
-
-
Mihaljevic, M.1
-
21
-
-
84947910320
-
-
Information Security and Privacy - ACISP '96, Lecture Notes in Computer Science, vol.1072, pp.182-189, 1996.
-
M. Mihaljevic, "A faster cryptanalysis of the self-shrinking generator," Information Security and Privacy - ACISP '96, Lecture Notes in Computer Science, vol.1072, pp.182-189, 1996.
-
"A Faster Cryptanalysis of the Self-shrinking Generator,"
-
-
Mihaljevic, M.1
-
22
-
-
85027172173
-
-
ISITA 90 - 1996 IEEE Int. Symp. Inform. Theory and Appl., Canada, Victoria, B.C., Proc. pp.246-249, Sept. 1996.
-
M. Mihaljevic, "Security examination of certain cellular automata based key stream generator," ISITA 90 - 1996 IEEE Int. Symp. Inform. Theory and Appl., Canada, Victoria, B.C., Proc. pp.246-249, Sept. 1996.
-
"Security Examination of Certain Cellular Automata Based Key Stream Generator,"
-
-
Mihaljevic, M.1
-
23
-
-
0012279808
-
-
Applied Algebra, Algorithms and Error Correcting Codes - AAECC 12, Lecture Notes in Computer Science, vol.1255, pp.250-262, 1997.
-
M. Mihaljevic, "Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach," Applied Algebra, Algorithms and Error Correcting Codes - AAECC 12, Lecture Notes in Computer Science, vol.1255, pp.250-262, 1997.
-
"Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach,"
-
-
Mihaljevic, M.1
-
24
-
-
85027185045
-
-
Information and Communication Security - ICICS '97, Lecture Notes in Computer Science, vol.1334, pp.181-191, 1997.
-
M. Mihaljevic, "An improved key stream generator based on the programmable cellular automata," Information and Communication Security - ICICS '97, Lecture Notes in Computer Science, vol.1334, pp.181-191, 1997.
-
"An Improved Key Stream Generator Based on the Programmable Cellular Automata,"
-
-
Mihaljevic, M.1
-
25
-
-
0028750092
-
-
IEEE Trans. Comput., vol.43, pp.1346-1357, 1994.
-
S. Nandi, B.K. Kar, and P. Pal Chaudhuri, "Theory and applications of cellular automata in cryptography," IEEE Trans. Comput., vol.43, pp.1346-1357, 1994.
-
B.K. Kar, and P. Pal Chaudhuri, "Theory and Applications of Cellular Automata in Cryptography,"
-
-
Nandi, S.1
-
26
-
-
57849101476
-
-
Cryptologia, vol.9, pp.114-130, 1985.
-
C.T. Retter, "A key-search attack on MacLaren-Marsaglia system," Cryptologia, vol.9, pp.114-130, 1985.
-
"A Key-search Attack on MacLaren-Marsaglia System,"
-
-
Retter, C.T.1
-
28
-
-
3042530308
-
-
in Contemporary Cryptology: The Science of Information Integrity, ed. G. Simmons, pp.65-134. IEEE Press,'New-York, 1991.
-
R.A. Rueppel, "Stream ciphers," in Contemporary Cryptology: The Science of Information Integrity, ed. G. Simmons, pp.65-134. IEEE Press,'New-York, 1991.
-
"Stream Ciphers,"
-
-
Rueppel, R.A.1
-
29
-
-
0003851399
-
-
2nd ed., John Wiley, NewYork, 1996.
-
B. Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Codes in C," 2nd ed., John Wiley, NewYork, 1996.
-
"Applied Cryptography: Protocols, Algorithms, and Source Codes in C,"
-
-
Schneier, B.1
-
30
-
-
85034624593
-
-
Advances in Cryptology EUROCRYPT'85, Lecture Notes in Computer Science, vol.219, pp.103-110. 1986.
-
T. Siegenthaler, "Cryptanalyst's representation of nonlinearly filtered mi-sequences," Advances in Cryptology EUROCRYPT'85, Lecture Notes in Computer Science, vol.219, pp.103-110. 1986.
-
"Cryptanalyst's Representation of Nonlinearly Filtered Mi-sequences,"
-
-
Siegenthaler, T.1
-
31
-
-
84992720189
-
-
Advances in cryptology - CRYPTO 85, Lecture Notes in Computer Science, vol.218, pp.429-432, 1985.
-
S. Wolfram, "Cryptography with cellular automata," Advances in cryptology - CRYPTO 85, Lecture Notes in Computer Science, vol.218, pp.429-432, 1985.
-
"Cryptography with Cellular Automata,"
-
-
Wolfram, S.1
-
33
-
-
84944076741
-
-
Ad vances in Cryptology-ASIACRYPT'98, Lecture Notes in Computer Science, vol.1514, pp.327-341, 1998.
-
L. Knudsen, W. Meier, B. Preneel, V. Rijmen, and S. Verdoolaege, "Analysis methods for (alleged) RC4," Ad vances in Cryptology-ASIACRYPT'98, Lecture Notes in Computer Science, vol.1514, pp.327-341, 1998.
-
W. Meier, B. Preneel, V. Rijmen, and S. Verdoolaege, "Analysis Methods for (Alleged) RC4,"
-
-
Knudsen, L.1
|