메뉴 건너뛰기




Volumn 2595, Issue , 2003, Pages 232-249

A new cryptanalytic attack for PN-generators filtered by a Boolean function

Author keywords

APP decoding; Boolean functions; Fourier transform; Stream ciphers

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; FOURIER TRANSFORMS; ITERATIVE DECODING; ITERATIVE METHODS;

EID: 24144441508     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36492-7_16     Document Type: Article
Times cited : (13)

References (24)
  • 1
    • 84948981360 scopus 로고
    • Searching for the optimum correlation attack
    • Fast Software Encryption -Leuven 94, Springer-Verlag
    • R.J. Anderson, "Searching for the optimum correlation attack," Fast Software Encryption -Leuven 94, Lectures Notes in Computer Science, vol. 1008, pp. 137-143, Springer-Verlag, 1995.
    • (1995) Lectures Notes in Computer Science , vol.1008 , pp. 137-143
    • Anderson, R.J.1
  • 2
    • 0027297425 scopus 로고
    • Near Shannon limit error-correcting coding and decoding: Turbo-codes
    • Geneva, May
    • C. Berrou, A. Glavieux and P. Thitimajshima: "Near Shannon limit error-correcting coding and decoding: turbo-codes," Proceedings of ICC'93, Geneva, pp. 1064-1070, May 1993.
    • (1993) Proceedings of ICC'93 , pp. 1064-1070
    • Berrou, C.1    Glavieux, A.2    Thitimajshima, P.3
  • 3
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • Advances in Cryptology - EUROCRYPT 2000, Springer Verlag
    • A. Canteaut and M. Trabbia: "Improved fast correlation attacks using parity-check equations of weight 4 and 5," Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, pp. 573-588, Springer Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 4
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers
    • Fast Software Encryption 2000, Springer Verlag
    • V. V. Chepyzhov, T. Johansson and B. Smeets," A simple algorithm for fast correlation attacks on stream ciphers," Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 181-195, Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 181-195
    • Chepyzhov, V.V.1    Johansson, T.2    Smeets, B.3
  • 7
    • 0030261891 scopus 로고    scopus 로고
    • Computation of low-weight parity-check polynomials
    • J.Dj. Golic, "Computation of low-weight parity-check polynomials," Electronics Letters, vol. 32, pp. 1981-1982, 1996.
    • (1996) Electronics Letters , vol.32 , pp. 1981-1982
    • Golic, J.Dj.1
  • 8
    • 0034291050 scopus 로고    scopus 로고
    • Generalized Inversion Attack on Nonlinear Filter Generators
    • October
    • J.Dj. Golic, A. Clark and E. Dawson, "Generalized Inversion Attack on Nonlinear Filter Generators," IEEE Transactions on computers, vol.49, No. 10, October 2000.
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.10
    • Golic, J.Dj.1    Clark, A.2    Dawson, E.3
  • 10
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attack on stream ciphers via convolutional codes
    • Advances in Cryptology - EUROCRYPT'99, Springer Verlag
    • T. Johansson and F. Jönsson: "Improved fast correlation attack on stream ciphers via convolutional codes," Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol. 1592, pp. 347-362, Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 347-362
    • Johansson, T.1    Jönsson, F.2
  • 11
    • 84957062097 scopus 로고    scopus 로고
    • Fast correlation attacks based on turbo code techniques
    • Advances in Cryptology - CRYPTO'99, Springer Verlag
    • T. Johansson and F. Jönsson: "Fast correlation attacks based on turbo code techniques," Advances in Cryptology - CRYPTO'99, in Lecture Notes in Computer Science, vol. 1666, pp. 181-197, Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 181-197
    • Johansson, T.1    Jönsson, F.2
  • 12
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • Advances in Cryptology - CRYPTO'2000, Springer Verlag
    • T. Johansson and F. Jönsson, "Fast correlation attacks through reconstruction of linear polynomials," Advances in Cryptology - CRYPTO'2000, Lecture Notes in Computer Science, vol. 1880, pp. 300-315, Springer Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 300-315
    • Johansson, T.1    Jönsson, F.2
  • 13
    • 84943245714 scopus 로고    scopus 로고
    • Cryptanalysis of nonlinear filter generators with {0, 1}-metric Viterbi decoding
    • IMA International Conference 2001, Springer Verlag
    • S. Leveiller, J.J. Boutros, P. Guillot, G. Zémor, "Cryptanalysis of nonlinear filter generators with {0, 1}-metric Viterbi decoding," IMA International Conference 2001, Lecture Notes in Computer Science, vol. 2260, pp. 402-414, Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2260 , pp. 402-414
    • Leveiller, S.1    Boutros, J.J.2    Guillot, P.3    Zémor, G.4
  • 14
    • 0033099611 scopus 로고    scopus 로고
    • Good Error-Correcting Codes based on Very Sparse Matrices
    • March
    • D.J.C MacKay: "Good Error-Correcting Codes based on Very Sparse Matrices," IEEE Transactions on Information Theory, vol. 45, March 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45
    • MacKay, D.J.C.1
  • 16
    • 0024860262 scopus 로고
    • Fast correlation attack on certain stream ciphers
    • W. Meier and O. Staffelbach: " Fast correlation attack on certain stream ciphers," Journal of Cryptology, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 17
    • 84962928435 scopus 로고
    • Nonlinearity Criteria for Cryptographic Functions
    • Advances in Cryptology - EUROCRYPT'89, Springer Verlag
    • W. Meier and O. Staffelbach: "Nonlinearity Criteria for Cryptographic Functions," Advances in Cryptology - EUROCRYPT'89, Lecture Notes in Computer Science, vol. 434, pp. 549-562, Springer Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.434 , pp. 549-562
    • Meier, W.1    Staffelbach, O.2
  • 18
    • 0035311895 scopus 로고    scopus 로고
    • On decoding techniques for cryptanalysis of certain encryption algorithms
    • Apr.
    • M.J. Mihaljević, M.P.C. Fossorier and H. Imai, "On decoding techniques for cryptanalysis of certain encryption algorithms", IEICE Transactions on Fundamentals, vol. E84-A, pp. 919-930, Apr. 2001.
    • (2001) IEICE Transactions on Fundamentals , vol.E84-A , pp. 919-930
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 19
    • 84974727960 scopus 로고    scopus 로고
    • A low-complexity and high-performance algorithm for the fast correlation attack
    • Fast Software Encryption 2000, Springer Verlag
    • M.J. Mihaljević, M.P.C. Fossorier and H. Imai, "A low-complexity and high-performance algorithm for the fast correlation attack", Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 196-212
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 20
    • 84958981368 scopus 로고    scopus 로고
    • Fast correlation attack algorithm with the list decoding and an application
    • Fast Software Encryption 2001, Springer Verlag
    • M.J. Mihaljević, M.P.C. Fossorier and H. Imai, "Fast correlation attack algorithm with the list decoding and an application", Fast Software Encryption 2001, Lecture Notes in Computer Science, vol. 2355, pp. 196-210, Springer Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2355 , pp. 196-210
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 22
    • 0021489155 scopus 로고
    • Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications
    • T. Siegenthaler: "Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications," IEEE Transactions on Information Theory, vol. IT-30, pp. 776-780, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.IT-30 , pp. 776-780
    • Siegenthaler, T.1
  • 24
    • 84958623161 scopus 로고    scopus 로고
    • Plateaued Functions
    • 2nd International Conference on Information and Communications Security, ICISC'99, Springer-Verlag
    • Y. Zheng and X.-M. Zhang: "Plateaued Functions," 2nd International Conference on Information and Communications Security, ICISC'99, Lecture Notes in Computer Science, vol. 1758, pp. 284-300, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1758 , pp. 284-300
    • Zheng, Y.1    Zhang, X.-M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.