-
1
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
-
A. Canteaut and M. Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 573-588. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
2
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
Fast Software Encryption 2000, Springer-Verlag
-
V. Chepyzhov, T. Johansson, and B. Smeets. A simple algorithm for fast correlation attacks on stream ciphers. In Fast Software Encryption 2000, volume 1978 of Lecture Notes in Computer Science, pages 181-195. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 181-195
-
-
Chepyzhov, V.1
Johansson, T.2
Smeets, B.3
-
3
-
-
24144449243
-
The LILI-128 keystream generator
-
Selected Areas in Cryptography - SAC 2000, Springer-Verlag
-
A. Clark, E. Dawson, J. Fuller, J. Golic, H-J. Lee, William Millan, S-J. Moon, and L. Simpson. The LILI-128 keystream generator. In Selected Areas in Cryptography - SAC 2000, volume 2012 of Lecture Notes in Computer Science. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2012
-
-
Clark, A.1
Dawson, E.2
Fuller, J.3
Golic, J.4
Lee, H.-J.5
Millan, W.6
Moon, S.-J.7
Simpson, L.8
-
4
-
-
84937397479
-
Cryptanalysis of stream ciphers with linear masking
-
In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
D. Coppersmith, S. Halevi, and C.S. Jutla. Cryptanalysis of stream ciphers with linear masking. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 515-532. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 515-532
-
-
Coppersmith, D.1
Halevi, S.2
Jutla, C.S.3
-
5
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, Springer-Verlag
-
N. Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 176-194. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 176-194
-
-
Courtois, N.1
-
6
-
-
35248820612
-
Algebraic attack on strem ciphers with linear feedback
-
E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, Springer-Verlag
-
N. Courtois and W. Meier. Algebraic attack on strem ciphers with linear feedback. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 345-359. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
8
-
-
84949479756
-
Distinguishing attacks on SOBER-t16 and SOBER-t32
-
J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, Springer-Verlag
-
P. Ekdahl and T. Johansson. Distinguishing attacks on SOBER-t16 and SOBER-t32. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of Lecture Notes in Computer Science, pages 210-224. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2365
, pp. 210-224
-
-
Ekdahl, P.1
Johansson, T.2
-
9
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
October
-
J.D. Golić. Computation of low-weight parity-check polynomials. Electronic Letters, 32(21): 1981-1982, October 1996.
-
(1996)
Electronic Letters
, vol.32
, Issue.21
, pp. 1981-1982
-
-
Golić, J.D.1
-
10
-
-
84958983180
-
On the security of nonlinear filter generators
-
D. Gollman, editor, Fast Software Encryption'96, Springer-Verlag
-
J.D. Golić. On the security of nonlinear filter generators. In D. Gollman, editor, Fast Software Encryption'96, volume 1039 of Lecture Notes in Computer Science, pages 173-188. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
, pp. 173-188
-
-
Golić, J.D.1
-
11
-
-
84961308145
-
Inversion attack and branching
-
J. Pieprzyk, R. Safavi-Naini, and J.Seberry, editors, Information Security and Privacy: 4th Australasian Conference, ACISP'99, Springer-Verlag
-
J.D. Golić, A. Clark, and E. Dawson. Inversion attack and branching. In J. Pieprzyk, R. Safavi-Naini, and J.Seberry, editors, Information Security and Privacy: 4th Australasian Conference, ACISP'99, volume 1587 of Lecture Notes in Computer Science, pages 88-102. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1587
, pp. 88-102
-
-
Golić, J.D.1
Clark, A.2
Dawson, E.3
-
13
-
-
84957062097
-
Fast correlation attacks based on turbo code techniques
-
Advances in Cryptology - CRYPTO'99, Springer-Verlag
-
T. Johansson and F. Jönsson. Fast correlation attacks based on turbo code techniques. In Advances in Cryptology - CRYPTO'99, volume 1666 of Lecture Notes in Computer Science, pages 181-197. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
14
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
Advances in Cryptology - EUROCRYPT'99, Springer-Verlag
-
T. Johansson and F. Jönsson. Improved fast correlation attacks on stream ciphers via convolutional codes. In Advances in Cryptology - EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 347-362. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jönsson, F.2
-
16
-
-
24144441508
-
A new cryptanalytic attack for pn-generators filtered by a boolean function
-
K. Nyberg and H. Heys, editors, Selected Areas in Cryptography - SAC 2002, Springer-Verlag
-
S. Leveiller, G. Zémor, P. Guillot, and J. Boutros. A new cryptanalytic attack for pn-generators filtered by a boolean function. In K. Nyberg and H. Heys, editors, Selected Areas in Cryptography - SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 232-249. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2595
, pp. 232-249
-
-
Leveiller, S.1
Zémor, G.2
Guillot, P.3
Boutros, J.4
-
17
-
-
33745650569
-
Fast correlation attacks on stream ciphers
-
C.G. Günter, editor, Advances in Cryptology - EUROCRYPT'88, Springer-Verlag
-
W. Meier and O. Staffelbach. Fast correlation attacks on stream ciphers. In C.G. Günter, editor, Advances in Cryptology - EUROCRYPT'88, volume 330 of Lecture Notes in Computer Science, pages 301-316. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 301-316
-
-
Meier, W.1
Staffelbach, O.2
-
19
-
-
33645583981
-
Improved linear consistency attack on irregular clocked keystream generators
-
H. Molland. Improved linear consistency attack on irregular clocked keystream generators. In Fast Software Encryption 2004.
-
Fast Software Encryption 2004
-
-
Molland, H.1
-
20
-
-
33645593916
-
An improved correlation attack against irregular clocked and filtered keystream generators
-
H. Molland and T. Helleseth. An improved correlation attack against irregular clocked and filtered keystream generators. In Advances in Cryptology - CRYPTO 2004.
-
Advances in Cryptology - CRYPTO 2004
-
-
Molland, H.1
Helleseth, T.2
-
21
-
-
4344695027
-
-
PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden
-
E. Pasalic. On Boolean Functions in Symmetric-Key Ciphers. PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden, 2003.
-
(2003)
On Boolean Functions in Symmetric-key Ciphers
-
-
Pasalic, E.1
-
22
-
-
84949427555
-
A time-memory tradeoff attack against LILI-128
-
J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, Springer-Verlag
-
M-J.O. Saarinen. A time-memory tradeoff attack against LILI-128. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of Lecture Notes in Computer Science, pages 231-236. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2365
, pp. 231-236
-
-
Saarinen, M.-J.O.1
-
23
-
-
0021489155
-
Correlation-immunity of non-linear combining functions for cryptographic applications
-
T. Siegenthaler. Correlation-immunity of non-linear combining functions for cryptographic applications. IEEE Transactions on Information Theory, 30:776-780, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, pp. 776-780
-
-
Siegenthaler, T.1
-
24
-
-
84937428040
-
A generalized birthday problem
-
M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
D. Wagner. A generalized birthday problem. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 288-303. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
|