-
1
-
-
84948981360
-
Searching for the optimum correlation attack
-
Fast Software Encryption -Leuven 94, Springer-Verlag
-
R.J. Anderson, "Searching for the optimum correlation attack," Fast Software Encryption -Leuven 94, Lectures Notes in Computer Science, vol. 1008, pp. 137-143, Springer-Verlag, 1995.
-
(1995)
Lectures Notes in Computer Science
, vol.1008
, pp. 137-143
-
-
Anderson, R.J.1
-
2
-
-
0027297425
-
Near Shannon limit error-correcting coding and decoding: Turbo-codes
-
Geneva, May
-
C. Berrou, A. Glavieux and P. Thitimajshima: "Near Shannon limit error-correcting coding and decoding: turbo-codes," Proceedings of ICC'93, Geneva, pp. 1064-1070, May 1993.
-
(1993)
Proceedings of ICC'93
, pp. 1064-1070
-
-
Berrou, C.1
Glavieux, A.2
Thitimajshima, P.3
-
3
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
Advances in Cryptology - EUROCRYPT 2000, Springer Verlag
-
A. Canteaut and M. Trabbia: "Improved fast correlation attacks using parity-check equations of weight 4 and 5," Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, pp. 573-588, Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
4
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
Fast Software Encryption 2000, Springer Verlag
-
V. V. Chepyzhov, T. Johansson and B. Smeets," A simple algorithm for fast correlation attacks on stream ciphers," Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 181-195, Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 181-195
-
-
Chepyzhov, V.V.1
Johansson, T.2
Smeets, B.3
-
7
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
J.Dj. Golic, "Computation of low-weight parity-check polynomials," Electronics Letters, vol. 32, pp. 1981-1982, 1996.
-
(1996)
Electronics Letters
, vol.32
, pp. 1981-1982
-
-
Golic, J.Dj.1
-
8
-
-
0034291050
-
Generalized Inversion Attack on Nonlinear Filter Generators
-
October
-
J.Dj. Golic, A. Clark and E. Dawson, "Generalized Inversion Attack on Nonlinear Filter Generators," IEEE Transactions on computers, vol.49, No. 10, October 2000.
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.10
-
-
Golic, J.Dj.1
Clark, A.2
Dawson, E.3
-
10
-
-
84957702423
-
Improved fast correlation attack on stream ciphers via convolutional codes
-
Advances in Cryptology - EUROCRYPT'99, Springer Verlag
-
T. Johansson and F. Jönsson: "Improved fast correlation attack on stream ciphers via convolutional codes," Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol. 1592, pp. 347-362, Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jönsson, F.2
-
11
-
-
84957062097
-
Fast correlation attacks based on turbo code techniques
-
Advances in Cryptology - CRYPTO'99, Springer Verlag
-
T. Johansson and F. Jönsson: "Fast correlation attacks based on turbo code techniques," Advances in Cryptology - CRYPTO'99, in Lecture Notes in Computer Science, vol. 1666, pp. 181-197, Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
12
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials
-
Advances in Cryptology - CRYPTO'2000, Springer Verlag
-
T. Johansson and F. Jönsson, "Fast correlation attacks through reconstruction of linear polynomials," Advances in Cryptology - CRYPTO'2000, Lecture Notes in Computer Science, vol. 1880, pp. 300-315, Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jönsson, F.2
-
13
-
-
84943245714
-
Cryptanalysis of nonlinear filter generators with {0, 1}-metric Viterbi decoding
-
IMA International Conference 2001, Springer Verlag
-
S. Leveiller, J.J. Boutros, P. Guillot, G. Zémor, "Cryptanalysis of nonlinear filter generators with {0, 1}-metric Viterbi decoding," IMA International Conference 2001, Lecture Notes in Computer Science, vol. 2260, pp. 402-414, Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2260
, pp. 402-414
-
-
Leveiller, S.1
Boutros, J.J.2
Guillot, P.3
Zémor, G.4
-
14
-
-
0033099611
-
Good Error-Correcting Codes based on Very Sparse Matrices
-
March
-
D.J.C MacKay: "Good Error-Correcting Codes based on Very Sparse Matrices," IEEE Transactions on Information Theory, vol. 45, March 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
-
-
MacKay, D.J.C.1
-
16
-
-
0024860262
-
Fast correlation attack on certain stream ciphers
-
W. Meier and O. Staffelbach: " Fast correlation attack on certain stream ciphers," Journal of Cryptology, pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
17
-
-
84962928435
-
Nonlinearity Criteria for Cryptographic Functions
-
Advances in Cryptology - EUROCRYPT'89, Springer Verlag
-
W. Meier and O. Staffelbach: "Nonlinearity Criteria for Cryptographic Functions," Advances in Cryptology - EUROCRYPT'89, Lecture Notes in Computer Science, vol. 434, pp. 549-562, Springer Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 549-562
-
-
Meier, W.1
Staffelbach, O.2
-
18
-
-
0035311895
-
On decoding techniques for cryptanalysis of certain encryption algorithms
-
Apr.
-
M.J. Mihaljević, M.P.C. Fossorier and H. Imai, "On decoding techniques for cryptanalysis of certain encryption algorithms", IEICE Transactions on Fundamentals, vol. E84-A, pp. 919-930, Apr. 2001.
-
(2001)
IEICE Transactions on Fundamentals
, vol.E84-A
, pp. 919-930
-
-
Mihaljević, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
19
-
-
84974727960
-
A low-complexity and high-performance algorithm for the fast correlation attack
-
Fast Software Encryption 2000, Springer Verlag
-
M.J. Mihaljević, M.P.C. Fossorier and H. Imai, "A low-complexity and high-performance algorithm for the fast correlation attack", Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 196-212
-
-
Mihaljević, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
20
-
-
84958981368
-
Fast correlation attack algorithm with the list decoding and an application
-
Fast Software Encryption 2001, Springer Verlag
-
M.J. Mihaljević, M.P.C. Fossorier and H. Imai, "Fast correlation attack algorithm with the list decoding and an application", Fast Software Encryption 2001, Lecture Notes in Computer Science, vol. 2355, pp. 196-210, Springer Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2355
, pp. 196-210
-
-
Mihaljević, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
22
-
-
0021489155
-
Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications
-
T. Siegenthaler: "Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications," IEEE Transactions on Information Theory, vol. IT-30, pp. 776-780, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.IT-30
, pp. 776-780
-
-
Siegenthaler, T.1
-
24
-
-
84958623161
-
Plateaued Functions
-
2nd International Conference on Information and Communications Security, ICISC'99, Springer-Verlag
-
Y. Zheng and X.-M. Zhang: "Plateaued Functions," 2nd International Conference on Information and Communications Security, ICISC'99, Lecture Notes in Computer Science, vol. 1758, pp. 284-300, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1758
, pp. 284-300
-
-
Zheng, Y.1
Zhang, X.-M.2
|