메뉴 건너뛰기




Volumn 3357, Issue , 2005, Pages 39-53

A new simple technique to attack filter generators and related ciphers

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; COMPUTATIONAL COMPLEXITY;

EID: 24144456208     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (24)
  • 1
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
    • A. Canteaut and M. Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 573-588. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 2
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers
    • Fast Software Encryption 2000, Springer-Verlag
    • V. Chepyzhov, T. Johansson, and B. Smeets. A simple algorithm for fast correlation attacks on stream ciphers. In Fast Software Encryption 2000, volume 1978 of Lecture Notes in Computer Science, pages 181-195. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 181-195
    • Chepyzhov, V.1    Johansson, T.2    Smeets, B.3
  • 4
    • 84937397479 scopus 로고    scopus 로고
    • Cryptanalysis of stream ciphers with linear masking
    • In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
    • D. Coppersmith, S. Halevi, and C.S. Jutla. Cryptanalysis of stream ciphers with linear masking. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 515-532. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 515-532
    • Coppersmith, D.1    Halevi, S.2    Jutla, C.S.3
  • 5
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, Springer-Verlag
    • N. Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 176-194. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 176-194
    • Courtois, N.1
  • 6
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attack on strem ciphers with linear feedback
    • E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, Springer-Verlag
    • N. Courtois and W. Meier. Algebraic attack on strem ciphers with linear feedback. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 345-359. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 8
    • 84949479756 scopus 로고    scopus 로고
    • Distinguishing attacks on SOBER-t16 and SOBER-t32
    • J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, Springer-Verlag
    • P. Ekdahl and T. Johansson. Distinguishing attacks on SOBER-t16 and SOBER-t32. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of Lecture Notes in Computer Science, pages 210-224. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2365 , pp. 210-224
    • Ekdahl, P.1    Johansson, T.2
  • 9
    • 0030261891 scopus 로고    scopus 로고
    • Computation of low-weight parity-check polynomials
    • October
    • J.D. Golić. Computation of low-weight parity-check polynomials. Electronic Letters, 32(21): 1981-1982, October 1996.
    • (1996) Electronic Letters , vol.32 , Issue.21 , pp. 1981-1982
    • Golić, J.D.1
  • 10
    • 84958983180 scopus 로고    scopus 로고
    • On the security of nonlinear filter generators
    • D. Gollman, editor, Fast Software Encryption'96, Springer-Verlag
    • J.D. Golić. On the security of nonlinear filter generators. In D. Gollman, editor, Fast Software Encryption'96, volume 1039 of Lecture Notes in Computer Science, pages 173-188. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1039 , pp. 173-188
    • Golić, J.D.1
  • 11
    • 84961308145 scopus 로고    scopus 로고
    • Inversion attack and branching
    • J. Pieprzyk, R. Safavi-Naini, and J.Seberry, editors, Information Security and Privacy: 4th Australasian Conference, ACISP'99, Springer-Verlag
    • J.D. Golić, A. Clark, and E. Dawson. Inversion attack and branching. In J. Pieprzyk, R. Safavi-Naini, and J.Seberry, editors, Information Security and Privacy: 4th Australasian Conference, ACISP'99, volume 1587 of Lecture Notes in Computer Science, pages 88-102. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1587 , pp. 88-102
    • Golić, J.D.1    Clark, A.2    Dawson, E.3
  • 13
    • 84957062097 scopus 로고    scopus 로고
    • Fast correlation attacks based on turbo code techniques
    • Advances in Cryptology - CRYPTO'99, Springer-Verlag
    • T. Johansson and F. Jönsson. Fast correlation attacks based on turbo code techniques. In Advances in Cryptology - CRYPTO'99, volume 1666 of Lecture Notes in Computer Science, pages 181-197. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 181-197
    • Johansson, T.1    Jönsson, F.2
  • 14
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attacks on stream ciphers via convolutional codes
    • Advances in Cryptology - EUROCRYPT'99, Springer-Verlag
    • T. Johansson and F. Jönsson. Improved fast correlation attacks on stream ciphers via convolutional codes. In Advances in Cryptology - EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 347-362. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 347-362
    • Johansson, T.1    Jönsson, F.2
  • 16
    • 24144441508 scopus 로고    scopus 로고
    • A new cryptanalytic attack for pn-generators filtered by a boolean function
    • K. Nyberg and H. Heys, editors, Selected Areas in Cryptography - SAC 2002, Springer-Verlag
    • S. Leveiller, G. Zémor, P. Guillot, and J. Boutros. A new cryptanalytic attack for pn-generators filtered by a boolean function. In K. Nyberg and H. Heys, editors, Selected Areas in Cryptography - SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 232-249. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2595 , pp. 232-249
    • Leveiller, S.1    Zémor, G.2    Guillot, P.3    Boutros, J.4
  • 17
    • 33745650569 scopus 로고
    • Fast correlation attacks on stream ciphers
    • C.G. Günter, editor, Advances in Cryptology - EUROCRYPT'88, Springer-Verlag
    • W. Meier and O. Staffelbach. Fast correlation attacks on stream ciphers. In C.G. Günter, editor, Advances in Cryptology - EUROCRYPT'88, volume 330 of Lecture Notes in Computer Science, pages 301-316. Springer-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 301-316
    • Meier, W.1    Staffelbach, O.2
  • 19
    • 33645583981 scopus 로고    scopus 로고
    • Improved linear consistency attack on irregular clocked keystream generators
    • H. Molland. Improved linear consistency attack on irregular clocked keystream generators. In Fast Software Encryption 2004.
    • Fast Software Encryption 2004
    • Molland, H.1
  • 20
    • 33645593916 scopus 로고    scopus 로고
    • An improved correlation attack against irregular clocked and filtered keystream generators
    • H. Molland and T. Helleseth. An improved correlation attack against irregular clocked and filtered keystream generators. In Advances in Cryptology - CRYPTO 2004.
    • Advances in Cryptology - CRYPTO 2004
    • Molland, H.1    Helleseth, T.2
  • 21
    • 4344695027 scopus 로고    scopus 로고
    • PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden
    • E. Pasalic. On Boolean Functions in Symmetric-Key Ciphers. PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden, 2003.
    • (2003) On Boolean Functions in Symmetric-key Ciphers
    • Pasalic, E.1
  • 22
    • 84949427555 scopus 로고    scopus 로고
    • A time-memory tradeoff attack against LILI-128
    • J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, Springer-Verlag
    • M-J.O. Saarinen. A time-memory tradeoff attack against LILI-128. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of Lecture Notes in Computer Science, pages 231-236. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2365 , pp. 231-236
    • Saarinen, M.-J.O.1
  • 23
    • 0021489155 scopus 로고
    • Correlation-immunity of non-linear combining functions for cryptographic applications
    • T. Siegenthaler. Correlation-immunity of non-linear combining functions for cryptographic applications. IEEE Transactions on Information Theory, 30:776-780, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.30 , pp. 776-780
    • Siegenthaler, T.1
  • 24
    • 84937428040 scopus 로고    scopus 로고
    • A generalized birthday problem
    • M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
    • D. Wagner. A generalized birthday problem. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 288-303. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 288-303
    • Wagner, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.