-
3
-
-
84948963512
-
-
Advances in Cryptology - EUROCRYPT’00, Springer Verlag
-
A. Canteaut, M. Trabbia, Improved Fast Correlation Attacks using Parity-check Equations of weight 4 and 5. Advances in Cryptology - EUROCRYPT’00, LNCS 1807, pp 773-588, Springer Verlag 2000. 32, 33, 33, 38, 39
-
(2000)
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5
, vol.1807
, pp. 588-773
-
-
Canteaut, A.1
Trabbia, M.2
-
4
-
-
85088061604
-
-
Advances in Cryptology - EUROCRYPT’91, LNCS 547, Springer Verlag
-
V. Chepyzhov, B. Smeets, On a Fast Correlation Attack on Stream Ciphers, Advances in Cryptology - EUROCRYPT’91, LNCS 547, Springer Verlag, 1991. 32
-
(1991)
On a Fast Correlation Attack on Stream Ciphers
-
-
Chepyzhov, V.1
Smeets, B.2
-
5
-
-
0003227005
-
-
New York, to appear in Lecture Notes in Computer Science, Springer Verlag
-
V. Chepyzhov, T. Johansson, B. Smeets, A Simple Algorithm for Fast Correlation Attack on Stream Ciphers, Fast Software Encryption 2000, New York, to appear in Lecture Notes in Computer Science, Springer Verlag. 33, 33, 40, 40, 40, 41, 41
-
(2000)
A Simple Algorithm for Fast Correlation Attack on Stream Ciphers, Fast Software Encryption
-
-
Chepyzhov, V.1
Johansson, T.2
Smeets, B.3
-
6
-
-
84947799697
-
-
http://www-rocq.inria.fr/codes/Eric.Filiol/index.html 38
-
-
-
-
7
-
-
22044454152
-
-
Advances in Cryptology - EUROCRYPT’98, LNCS 1403, Springer Verlag
-
E. Filiol, C. Fontaine, Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity, Advances in Cryptology - EUROCRYPT’98, LNCS 1403, Springer Verlag, 1998. 32, 34
-
(1998)
Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity
-
-
Filiol, E.1
Fontaine, C.2
-
9
-
-
84957702423
-
Improved Fast Correlation Attack on stream Ciphers via Convolutional Codes
-
Springer Verlag
-
T. Johansson, F. Jönsson, Improved Fast Correlation Attack on stream Ciphers via Convolutional Codes, Advances in Cryptology - EUROCRYPT’99, LNCS 1592, pp 347–362, Springer Verlag, 1999 32
-
(1999)
Advances in Cryptology - EUROCRYPT’99
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jönsson, F.2
-
10
-
-
84957062097
-
Fast Correlation Attack based on Turbo Codes Techniques
-
Springer Verlag
-
T. Johansson, F. Jönsson, Fast Correlation Attack based on Turbo Codes Techniques, Advances in Cryptology - CRYPTO’99, LNCS 1666, pp 181–197, Springer Verlag, 1999 32
-
(1999)
Advances in Cryptology - CRYPTO’99
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
13
-
-
0024860262
-
Fast Correlation Attack on certain Stream Ciphers
-
W. Meier, O. Staffelbach, Fast Correlation Attack on certain Stream Ciphers, J. of Cryptology, pp 159–176, 1989. 32
-
(1989)
J. of Cryptology
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
14
-
-
85032480688
-
Fast Iterative Algorithm for a Shift-Register Initial State Reconstruction given the Noisy Output Sequence
-
Springer Verlag
-
M. Mihaljevic, J. Dj. Golic, A Fast Iterative Algorithm for a Shift-Register Initial State Reconstruction given the Noisy Output Sequence, Proc. Auscrypt’90, LNCS 453, Springer Verlag, 1990. 32
-
(1990)
Proc. Auscrypt’90
, vol.453
-
-
Mihaljevic, M.1
Dj, J.2
Golic, A.3
-
15
-
-
84958958752
-
Correlation Attacks on Stream Ciphers: Computing low Weight Parity Checks based on Error-Correcting Codes
-
Springer Verlag
-
W. Penzhorn, Correlation Attacks on Stream Ciphers: Computing low Weight Parity Checks based on Error-Correcting Codes, FSE’96, LNCS 1039, Springer Verlag, 1996. 32
-
(1996)
FSE’96
, vol.1039
-
-
Penzhorn, W.1
-
18
-
-
0021489155
-
Correlation Immunity of Nonlinear Combining functions for Cryptographic Applications
-
September
-
T. Siegenthaler, Correlation Immunity of Nonlinear Combining functions for Cryptographic Applications, IEEE Transactions on Information Theory, Vol. 35 Nr 5, September 1984, pp 776–780. 32, 34
-
(1984)
IEEE Transactions on Information Theory
, vol.35
, Issue.5
, pp. 776-780
-
-
Siegenthaler, T.1
-
19
-
-
0021786321
-
Decrypting a Class of Stream Ciphers using Ciphertext Only
-
T. Siegenthaler, Decrypting a Class of Stream Ciphers using Ciphertext Only, IEEE Transactions on Computers, 1, pp 81–84, 1985. 32, 34, 35
-
(1985)
IEEE Transactions on Computers
, vol.1
, pp. 81-84
-
-
Siegenthaler, T.1
|