메뉴 건너뛰기




Volumn 2247, Issue , 2001, Pages 62-72

Multiples of primitive polynomials over GF(2)

Author keywords

Cryptanalysis; Galois field; Polynomial multiples; Primitive polynomials; Stream cipher

Indexed keywords

CRYPTOGRAPHY; POLYNOMIALS;

EID: 33645191450     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45311-3_6     Document Type: Conference Paper
Times cited : (12)

References (12)
  • 1
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using paritycheck equations of weight 4 and 5
    • Lecture Notes in Computer Science, Springer Verlag
    • A. Canteaut and M. Trabbia. Improved fast correlation attacks using paritycheck equations of weight 4 and 5. In Advances in Cryptology - EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pages 573-588. Springer Verlag, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , Issue.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 4
    • 33645202082 scopus 로고    scopus 로고
    • Primitive polynomials over GF(2) - A cryptologic approach
    • Lecture Notes in Computer Science, Springer Verlag (to appear)
    • K. C. Gupta and S. Maitra. Primitive polynomials over GF(2) - A cryptologic approach. In ICICS 2001, Lecture Notes in Computer Science, Springer Verlag (to appear), 2001.
    • (2001) ICICS 2001
    • Gupta, K.C.1    Maitra, S.2
  • 5
    • 0025465287 scopus 로고
    • Some comments on Zech’s logarithms
    • July
    • K. Huber. Some comments on Zech’s logarithms. IEEE Transactions on Information Theory, IT-36(4): 946-950, July 1990.
    • (1990) IEEE Transactions on Information Theory , vol.IT-36 , Issue.4 , pp. 946-950
    • Huber, K.1
  • 6
    • 33645191994 scopus 로고    scopus 로고
    • On choice of connection polynomials for LFSR based stream ciphers
    • number 1977 in Lecture Notes in Computer Science, Springer Verlag
    • K. Jambunathan. On choice of connection polynomials for LFSR based stream ciphers. In Progress in Cryptology - INDOCRYPT 2000, number 1977 in Lecture Notes in Computer Science, pages 9-18. Springer Verlag, 2000.
    • (2000) Progress in Cryptology - INDOCRYPT 2000 , pp. 9-18
    • Jambunathan, K.1
  • 7
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • Lecture Notes in Computer Science, Springer Verlag
    • T. Johansson and F. Jonsson. Fast correlation attacks through reconstruction of linear polynomials. In Advances in Cryptology - CRYPTO 2000, number 1880 in Lecture Notes in Computer Science, pages 300-315. Springer Verlag, 2000.
    • (2000) Advances in Cryptology - CRYPTO 2000 , Issue.1880 , pp. 300-315
    • Johansson, T.1    Jonsson, F.2
  • 11
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1: 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 12
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • September
    • T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30(5): 776-780, September 1984.
    • (1984) IEEE Transactions on Information Theory , vol.IT-30 , Issue.5 , pp. 776-780
    • Siegenthaler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.