-
1
-
-
84974707207
-
Real time cryptanalysis of A5/1 on a PC
-
Lecture Notes in Computer Science, B. Schneier, ed., Springer-Verlag, Berlin
-
A. Biryukov, A. Shamir, and D. Wagner, Real time cryptanalysis of A5/1 on a PC, Fast Software Encryption - FSE, 2000, Lecture Notes in Computer Science, vol. 1978, B. Schneier, ed., Springer-Verlag, Berlin, pp. 1-18, 2001.
-
(2001)
Fast Software Encryption - FSE, 2000
, vol.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
2
-
-
84948973028
-
On random mappings and random permutations
-
Lecture Notes in Computer Science, B. Preneel, ed., Springer-Verlag, Berlin
-
W. G. Chambers, On random mappings and random permutations, Fast Software Encryption - FSE '94, Lecture Notes in Computer Science, vol. 1008, B. Preneel, ed., Springer-Verlag, Berlin, pp. 22-28, 1995.
-
(1995)
Fast Software Encryption - FSE '94
, vol.1008
, pp. 22-28
-
-
Chambers, W.G.1
-
3
-
-
84957381006
-
Cryptanalysis of alleged A5 stream cipher
-
Lecture Notes in Computer Science, W. Fumy, ed., Springer-Verlag, Berlin
-
J. Dj. Golić, Cryptanalysis of alleged A5 stream cipher, Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, vol. 1233, W. Fumy, ed., Springer-Verlag, Berlin, pp. 239-255, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
, vol.1233
, pp. 239-255
-
-
Golić, J.Dj.1
-
4
-
-
0000240435
-
Recent advances in stream cipher cryptanalysis
-
J. Dj. Golić, Recent advances in stream cipher cryptanalysis, Publications de l'Institut Mathematique, vol. 64/78, pp. 183-204, 1998.
-
(1998)
Publications de L'Institut Mathematique
, vol.64-78
, pp. 183-204
-
-
Golić, J.Dj.1
-
5
-
-
0034188579
-
Cryptanalysis of three mutually clock-controlled stop/go shift registers
-
May
-
J. Dj. Golić, Cryptanalysis of three mutually clock-controlled stop/go shift registers, IEEE Transactions on Information Theory, vol. 46, pp. 1081-1090, May 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1081-1090
-
-
Golić, J.Dj.1
-
6
-
-
84958673691
-
Edit distance correlation attack on the alternating step generator
-
Lecture Notes in Computer Science, B. Kaliski, ed., Springer-Verlag, Berlin
-
J. Dj. Golić and R. Menicocci, Edit distance correlation attack on the alternating step generator, Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, vol. 1294, B. Kaliski, ed., Springer-Verlag, Berlin, pp. 499-512, 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97
, vol.1294
, pp. 499-512
-
-
Golić, J.Dj.1
Menicocci, R.2
-
7
-
-
0025824847
-
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
-
J. Dj. Golić and M. Mihaljević, A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance, Journal of Cryptology, vol. 3(3), pp. 201-212, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, Issue.3
, pp. 201-212
-
-
Golić, J.Dj.1
Mihaljević, M.2
-
8
-
-
84948975118
-
Embedding and probabilistic correlation attacks on clock-controlled shift registers
-
Lecture Notes in Computer Science, A. De Santis, ed., Springer-Verlag, Berlin
-
J. Dj. Golić and L. O'Connor, Embedding and probabilistic correlation attacks on clock-controlled shift registers, Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis, ed., Springer-Verlag, Berlin, pp. 230-243, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT '94
, vol.950
, pp. 230-243
-
-
Golić, J.Dj.1
O'Connor, L.2
-
9
-
-
0008772856
-
A generalized correlation attack with a probabilistic constrained edit distance
-
Lecture Notes in Computer Science, R. A. Rueppel, ed., Springer-Verlag, Berlin
-
J. Dj. Golić and S. Petrović, A generalized correlation attack with a probabilistic constrained edit distance, Advances in Cryptology - EUROCRYPT'92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel, ed., Springer-Verlag, Berlin, pp. 472-476, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT'92
, vol.658
, pp. 472-476
-
-
Golić, J.Dj.1
Petrović, S.2
-
11
-
-
85034847491
-
Alternating step generators controlled by de Bruijn sequences
-
Lecture Notes in Computer Science, D. Chaum and W. L. Price, eds., Springer-Verlag, Berlin
-
C. G. Günther, Alternating step generators controlled by de Bruijn sequences, Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science, vol. 304, D. Chaum and W. L. Price, eds., Springer-Verlag, Berlin, pp. 5-14, 1988.
-
(1988)
Advances in Cryptology - EUROCRYPT '87
, vol.304
, pp. 5-14
-
-
Günther, C.G.1
-
12
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
14
-
-
84956482823
-
Large primes in stream-cipher cryptography
-
Lecture Notes in Computer Science, J. Seberry and J. Pieprzyk, eds., Springer-Verlag, Berlin
-
K. Zeng, C. H. Yang, and T. R. N. Rao, Large primes in stream-cipher cryptography, Advances in Cryptology - AUSCRYPT '90, Lecture Notes in Computer Science, vol. 453, J. Seberry and J. Pieprzyk, eds., Springer-Verlag, Berlin, pp. 194-205, 1990.
-
(1990)
Advances in Cryptology - AUSCRYPT '90
, vol.453
, pp. 194-205
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.N.3
-
15
-
-
0026105188
-
Pseudorandom bit generators in stream-cipher cryptography
-
Feb.
-
K. Zeng, C. H. Yang, D. Y. Wey, and T. R. N. Rao, Pseudorandom bit generators in stream-cipher cryptography, IEEE Computer, vol. 24(2), pp. 8-17, Feb. 1991.
-
(1991)
IEEE Computer
, vol.24
, Issue.2
, pp. 8-17
-
-
Zeng, K.1
Yang, C.H.2
Wey, D.Y.3
Rao, T.R.N.4
|