메뉴 건너뛰기




Volumn 2595, Issue , 2003, Pages 196-213

Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)

Author keywords

Cryptanalysis; Keystream generators; Linear feedback shift registers over Gf(q); Nonlinear combination generator; Resilient functions

Indexed keywords

CRYPTOGRAPHY; SHIFT REGISTERS;

EID: 21144456505     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36492-7_14     Document Type: Article
Times cited : (4)

References (20)
  • 1
    • 0027634906 scopus 로고
    • A faster attack on certain stream ciphers
    • 22nd July
    • R. J. Anderson, "A faster attack on certain stream ciphers", Electronics Letters, vol. 29, pp. 1322-1323, 22nd July 1993.
    • (1993) Electronics Letters , vol.29 , pp. 1322-1323
    • Anderson, R.J.1
  • 2
    • 1942512572 scopus 로고    scopus 로고
    • Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutationsAdvance in Cryptology - CRYPTO'96
    • P. Camion and A. Canteaut, "Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations", Advance in Cryptology - CRYPTO'96, Lecture Notes in Computer Science, vol. 1109, pp. 372-386, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 372-386
    • Camion, P.1    Canteaut, A.2
  • 3
    • 0000950863 scopus 로고    scopus 로고
    • Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography
    • P. Camion and A. Canteaut, "Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography", Design, Codes and Cryptography, vol 16, pp.103- 116, 1999.
    • (1999) Design, Codes and Cryptography , vol.16 , pp. 103-116
    • Camion, P.1    Canteaut, A.2
  • 4
    • 0036350610 scopus 로고    scopus 로고
    • On employment of LFSRs over GF(q) in certain stream ciphers
    • Lausanne, Switzerland, July Proceedings
    • P. Camion, M. J. Mihaljević and H. Imai, "On employment of LFSRs over GF(q) in certain stream ciphers", IEEE Int. Symp. Inform. Theory - ISIT2002, Lausanne, Switzerland, July 2002, Proceedings, p. 210.
    • (2002) IEEE Int. Symp. Inform. Theory - ISIT2002 , pp. 210
    • Camion, P.1    Mihaljević, M.J.2    Imai, H.3
  • 5
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • Advances in Cryptology - EUROCRYPT 2000
    • A. Canteaut and M. Trabbia, "Improved fast correlation attacks using parity-check equations of weight 4 and 5", Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, pp. 573-588, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 6
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers
    • Fast Software Encryption 2000
    • V.V. Chepyzhov, T. Johansson and B. Smeets, "A simple algorithm for fast correlation attacks on stream ciphers", Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 180-195, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 180-195
    • Chepyzhov, V.V.1    Johansson, T.2    Smeets, B.3
  • 7
    • 84888039254 scopus 로고    scopus 로고
    • Fast correlation attacks: An algorithmic point of view
    • Advances in Cryptology - EUROCRYPT 2002
    • P. Chose, A. Joux and M. Mitton, "Fast correlation attacks: An algorithmic point of view", Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, pp. 209-221, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 209-221
    • Chose, P.1    Joux, A.2    Mitton, M.3
  • 8
    • 34250865154 scopus 로고
    • On linear complexity of functions of periodic GF(q) sequences
    • Jan.
    • J. Dj. Golić, "On linear complexity of functions of periodic GF(q) sequences", IEEE Trans. Inform. Theory, vol. 35, pp. 69-75, Jan. 1989.
    • (1989) IEEE Trans. Inform. Theory , vol.35 , pp. 69-75
    • Golić, J.Dj.1
  • 9
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • Advances in Cryptology - CRYPTO 2000
    • T. Johansson and F. Jonsson, "Fast correlation attacks through reconstruction of linear polynomials", Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 300-315, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 300-315
    • Johansson, T.1    Jonsson, F.2
  • 11
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • J. L. Massey, "Shift-register synthesis and BCH decoding", IEEE Trans. Inform. Theory, vol. IT-15, pp. 122-127, 1969.
    • (1969) IEEE Trans. Inform. Theory , vol.IT-15 , pp. 122-127
    • Massey, J.L.1
  • 13
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," Journal of Cryptology, vol. 1, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 14
    • 84974727960 scopus 로고    scopus 로고
    • A low-complexity and high-performance algorithm for the fast correlation attack
    • Fast Software Encryption - FSE 2000
    • M. J. Mihaljević, M. P. C. Fossorier and H. Imai, "A low-complexity and high-performance algorithm for the fast correlation attack", Fast Software Encryption - FSE 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 196-212
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 15
    • 0034269942 scopus 로고    scopus 로고
    • A method for convergence analysis of iterative probabilistic decoding
    • Sept.
    • M. J. Mihaljević and J. Golić, "A method for convergence analysis of iterative probabilistic decoding", IEEE Trans. Inform. Theory, vol. 46, pp. 2206-2211, Sept. 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 2206-2211
    • Mihaljević, M.J.1    Golić, J.2
  • 16
    • 0035311895 scopus 로고    scopus 로고
    • On decoding techniques for cryptanalysis of certain encryption algorithms
    • April
    • M. J. Mihaljević, M. P. C. Fossorier and H. Imai, "On decoding techniques for cryptanalysis of certain encryption algorithms", IEICE Trans. Fundamentals, vol. E84-A, pp. 919-930, April 2001.
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , pp. 919-930
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 17
    • 84958981368 scopus 로고    scopus 로고
    • Fast correlation attack algorithm with the list decoding and an application
    • Fast Software Encryption - FSE 2001
    • M. J. Mihaljević, M.P.C. Fossorier and H. Imai, "Fast correlation attack algorithm with the list decoding and an application", Fast Software Encryption - FSE 2001, Lecture Notes in Computer Science, vol 2355, pp. 196-210, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2355 , pp. 196-210
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 19
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only", IEEE Trans. Comput., vol. C-34, pp. 81-85, 1985.
    • (1985) IEEE Trans. Comput. , vol.C-34 , pp. 81-85
    • Siegenthaler, T.1
  • 20
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • T. Siegenthaler, "Correlation-immunity of nonlinear combining functions for cryptographic applications", IEEE Trans. Inform. Theory, vol. IT-30, pp. 776-780, 1984.
    • (1984) IEEE Trans. Inform. Theory , vol.IT-30 , pp. 776-780
    • Siegenthaler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.