메뉴 건너뛰기




Volumn 16, Issue 1, 2003, Pages 41-68

Edit probability correlation attacks on stop/go clocked keystream generators

Author keywords

Correlation attack; Edit probability; Stop go clocked shift registers; Stream ciphers

Indexed keywords

ALGORITHMS; PROBABILITY; SHIFT REGISTERS; STATISTICAL METHODS;

EID: 24044535056     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-002-9925-1     Document Type: Article
Times cited : (11)

References (15)
  • 1
    • 84974707207 scopus 로고    scopus 로고
    • Real time cryptanalysis of A5/1 on a PC
    • Lecture Notes in Computer Science, B. Schneier, ed., Springer-Verlag, Berlin
    • A. Biryukov, A. Shamir, and D. Wagner, Real time cryptanalysis of A5/1 on a PC, Fast Software Encryption - FSE, 2000, Lecture Notes in Computer Science, vol. 1978, B. Schneier, ed., Springer-Verlag, Berlin, pp. 1-18, 2001.
    • (2001) Fast Software Encryption - FSE, 2000 , vol.1978 , pp. 1-18
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 2
    • 84948973028 scopus 로고
    • On random mappings and random permutations
    • Lecture Notes in Computer Science, B. Preneel, ed., Springer-Verlag, Berlin
    • W. G. Chambers, On random mappings and random permutations, Fast Software Encryption - FSE '94, Lecture Notes in Computer Science, vol. 1008, B. Preneel, ed., Springer-Verlag, Berlin, pp. 22-28, 1995.
    • (1995) Fast Software Encryption - FSE '94 , vol.1008 , pp. 22-28
    • Chambers, W.G.1
  • 3
    • 84957381006 scopus 로고    scopus 로고
    • Cryptanalysis of alleged A5 stream cipher
    • Lecture Notes in Computer Science, W. Fumy, ed., Springer-Verlag, Berlin
    • J. Dj. Golić, Cryptanalysis of alleged A5 stream cipher, Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, vol. 1233, W. Fumy, ed., Springer-Verlag, Berlin, pp. 239-255, 1997.
    • (1997) Advances in Cryptology - EUROCRYPT '97 , vol.1233 , pp. 239-255
    • Golić, J.Dj.1
  • 4
    • 0000240435 scopus 로고    scopus 로고
    • Recent advances in stream cipher cryptanalysis
    • J. Dj. Golić, Recent advances in stream cipher cryptanalysis, Publications de l'Institut Mathematique, vol. 64/78, pp. 183-204, 1998.
    • (1998) Publications de L'Institut Mathematique , vol.64-78 , pp. 183-204
    • Golić, J.Dj.1
  • 5
    • 0034188579 scopus 로고    scopus 로고
    • Cryptanalysis of three mutually clock-controlled stop/go shift registers
    • May
    • J. Dj. Golić, Cryptanalysis of three mutually clock-controlled stop/go shift registers, IEEE Transactions on Information Theory, vol. 46, pp. 1081-1090, May 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 1081-1090
    • Golić, J.Dj.1
  • 6
    • 84958673691 scopus 로고    scopus 로고
    • Edit distance correlation attack on the alternating step generator
    • Lecture Notes in Computer Science, B. Kaliski, ed., Springer-Verlag, Berlin
    • J. Dj. Golić and R. Menicocci, Edit distance correlation attack on the alternating step generator, Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, vol. 1294, B. Kaliski, ed., Springer-Verlag, Berlin, pp. 499-512, 1997.
    • (1997) Advances in Cryptology - CRYPTO '97 , vol.1294 , pp. 499-512
    • Golić, J.Dj.1    Menicocci, R.2
  • 7
    • 0025824847 scopus 로고
    • A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    • J. Dj. Golić and M. Mihaljević, A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance, Journal of Cryptology, vol. 3(3), pp. 201-212, 1991.
    • (1991) Journal of Cryptology , vol.3 , Issue.3 , pp. 201-212
    • Golić, J.Dj.1    Mihaljević, M.2
  • 8
    • 84948975118 scopus 로고
    • Embedding and probabilistic correlation attacks on clock-controlled shift registers
    • Lecture Notes in Computer Science, A. De Santis, ed., Springer-Verlag, Berlin
    • J. Dj. Golić and L. O'Connor, Embedding and probabilistic correlation attacks on clock-controlled shift registers, Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis, ed., Springer-Verlag, Berlin, pp. 230-243, 1995.
    • (1995) Advances in Cryptology - EUROCRYPT '94 , vol.950 , pp. 230-243
    • Golić, J.Dj.1    O'Connor, L.2
  • 9
    • 0008772856 scopus 로고
    • A generalized correlation attack with a probabilistic constrained edit distance
    • Lecture Notes in Computer Science, R. A. Rueppel, ed., Springer-Verlag, Berlin
    • J. Dj. Golić and S. Petrović, A generalized correlation attack with a probabilistic constrained edit distance, Advances in Cryptology - EUROCRYPT'92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel, ed., Springer-Verlag, Berlin, pp. 472-476, 1993.
    • (1993) Advances in Cryptology - EUROCRYPT'92 , vol.658 , pp. 472-476
    • Golić, J.Dj.1    Petrović, S.2
  • 11
    • 85034847491 scopus 로고
    • Alternating step generators controlled by de Bruijn sequences
    • Lecture Notes in Computer Science, D. Chaum and W. L. Price, eds., Springer-Verlag, Berlin
    • C. G. Günther, Alternating step generators controlled by de Bruijn sequences, Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science, vol. 304, D. Chaum and W. L. Price, eds., Springer-Verlag, Berlin, pp. 5-14, 1988.
    • (1988) Advances in Cryptology - EUROCRYPT '87 , vol.304 , pp. 5-14
    • Günther, C.G.1
  • 14
    • 84956482823 scopus 로고
    • Large primes in stream-cipher cryptography
    • Lecture Notes in Computer Science, J. Seberry and J. Pieprzyk, eds., Springer-Verlag, Berlin
    • K. Zeng, C. H. Yang, and T. R. N. Rao, Large primes in stream-cipher cryptography, Advances in Cryptology - AUSCRYPT '90, Lecture Notes in Computer Science, vol. 453, J. Seberry and J. Pieprzyk, eds., Springer-Verlag, Berlin, pp. 194-205, 1990.
    • (1990) Advances in Cryptology - AUSCRYPT '90 , vol.453 , pp. 194-205
    • Zeng, K.1    Yang, C.H.2    Rao, T.R.N.3
  • 15
    • 0026105188 scopus 로고
    • Pseudorandom bit generators in stream-cipher cryptography
    • Feb.
    • K. Zeng, C. H. Yang, D. Y. Wey, and T. R. N. Rao, Pseudorandom bit generators in stream-cipher cryptography, IEEE Computer, vol. 24(2), pp. 8-17, Feb. 1991.
    • (1991) IEEE Computer , vol.24 , Issue.2 , pp. 8-17
    • Zeng, K.1    Yang, C.H.2    Wey, D.Y.3    Rao, T.R.N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.