메뉴 건너뛰기




Volumn 3797 LNCS, Issue , 2005, Pages 104-117

Design principles for combiners with memory

Author keywords

Algebraic attacks; Bluetooth E0; Combiners with memory; Correlation attacks; Stream cipher

Indexed keywords

CELLULAR TELEPHONE SYSTEMS; DATA REDUCTION; ONLINE SYSTEMS; SECURITY OF DATA; SPEECH TRANSMISSION; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33646842222     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11596219_9     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 1
    • 35248840147 scopus 로고    scopus 로고
    • Algebraic attacks on combiners with memory
    • Crypto 2003, Springer
    • Armknecht, Krause: Algebraic Attacks on Combiners with Memory, Crypto 2003, LNCS 2729, pp. 162-176, Springer, 2003
    • (2003) LNCS , vol.2729 , pp. 162-176
    • Armknecht1    Krause2
  • 2
    • 35048861887 scopus 로고    scopus 로고
    • Improving fast algebraic attacks
    • Fast Software Encryption 2004, Springer
    • Armknecht: Improving Fast Algebraic Attacks, Fast Software Encryption 2004, LNCS 3017, pp. 65-82, Springer, 2004
    • (2004) LNCS , vol.3017 , pp. 65-82
    • Armknecht1
  • 3
    • 24144437725 scopus 로고    scopus 로고
    • Extending the resynchronization attack
    • SAC 2004, Springer
    • Armknecht, Lano, Preneel: Extending the Resynchronization attack, SAC 2004, LNCS 3357, pp. 19-38, Springer, 2004
    • (2004) LNCS , vol.3357 , pp. 19-38
    • Armknecht1    Lano2    Preneel3
  • 5
    • 33646825475 scopus 로고    scopus 로고
    • On the (im)possibiliy of practical and secure nonlinear filters and combiners
    • to appear
    • An Braeken, Joe Lano: On the (im)possibiliy of practical and secure nonlinear filters and combiners, SAC 2005 (to appear)
    • SAC 2005
    • Braeken, A.1    Lano, J.2
  • 6
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • Crypto 2003, Springer
    • Courtois: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Crypto 2003, LNCS 2729, pp. 177-194, Springer, 2003
    • (2003) LNCS , vol.2729 , pp. 177-194
    • Courtois1
  • 7
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algoprithms for solving overdefined systems of multivariate polynomial equations
    • Eurocrypt 2000, Springer
    • Courtois, Klimov, Patarin, Shamir: Efficient Algoprithms for Solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt 2000, LNCS 1807, pp. 392-407, Springer 2000
    • (2000) LNCS , vol.1807 , pp. 392-407
    • Courtois1    Klimov2    Patarin3    Shamir4
  • 8
    • 33646828282 scopus 로고    scopus 로고
    • Cryptographically significant boolean functions: Construction and analysis in terms of algebraic immunity
    • Dalai, Gupta, Maitra: Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity, FSE 2005
    • FSE 2005
    • Dalai1    Gupta2    Maitra3
  • 10
    • 0010036629 scopus 로고
    • Correlation via linear sequential circuit approximation of combiners with memory
    • Eurocrypt 1993, Springer
    • Golić: Correlation via Linear Sequential Circuit Approximation of Combiners with Memory, Eurocrypt 1993, LNCS 658, pp. 113-123, Springer, 1993
    • (1993) LNCS , vol.658 , pp. 113-123
    • Golić1
  • 11
    • 0242549872 scopus 로고    scopus 로고
    • Correlation properties of general binary combiners with memory
    • Golić: Correlation Properties of General Binary Combiners with Memory. Journal of Cryptology 9(2), pp. 111-126, 1996
    • (1996) Journal of Cryptology , vol.9 , Issue.2 , pp. 111-126
    • Golić1
  • 12
    • 35048843339 scopus 로고    scopus 로고
    • Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
    • Crypto 2004, Springer
    • Hawkes, Rose: Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers, Crypto 2004, LNCS 3152, pp. 390-406, Springer, 2004. Available at http://eprint.iacr.org/2004/081/
    • (2004) LNCS , vol.3152 , pp. 390-406
    • Hawkes, R.1
  • 13
    • 33646833187 scopus 로고    scopus 로고
    • Information sets and partial permutation decoding for codes from finite geometries
    • Preprint Clemson Univ., to appear
    • Key, McDonough, Mavron: Information sets and partial permutation decoding for codes from finite geometries, Preprint Clemson Univ., to appear in Finite Field Applic., 2005
    • (2005) Finite Field Applic.
    • Key1    McDonough2    Mavron3
  • 14
    • 35048894912 scopus 로고    scopus 로고
    • Faster correlation attack on the bluetooth keystream generator
    • Crypto 2004, Springer
    • Lu, Vaudenay: Faster Correlation Attack on the Bluetooth Keystream Generator, Crypto 2004, LNCS 3152, pp. 407-425, Springer, 2004
    • (2004) LNCS , vol.3152 , pp. 407-425
    • Lu1    Vaudenay2
  • 15
    • 33646848015 scopus 로고    scopus 로고
    • Cryptanalysis of bluetooth keystream generator two-level E0
    • Asiacrypt 2004, Springer
    • Lu, Vaudenay: Cryptanalysis of Bluetooth Keystream Generator Two-Level E0, Asiacrypt 2004, LNCS 3329, pp. 483-499, Springer, 2004
    • (2004) LNCS , vol.3329 , pp. 483-499
    • Lu1    Vaudenay2
  • 16
    • 35048845264 scopus 로고    scopus 로고
    • Algebraic attacks and decomposition of boolean functions
    • Proceedings of Eurocrypt 2004, Springer
    • Meier, Pasalic, Carlet: Algebraic Attacks and Decomposition of Boolean Functions, Proceedings of Eurocrypt 2004, LNCS 3027, pp. 474-491, Springer, 2004
    • (2004) LNCS , vol.3027 , pp. 474-491
    • Meier1    Pasalic2    Carlet3
  • 18
    • 33646834387 scopus 로고    scopus 로고
    • A systematic procedure for applying fast correlation attacks to combiners with memory
    • Salmasizadeh, Golić, Dawson, Simpson: A Systematic Procedure for Applying Fast Correlation Attacks to Combiners with Memory, SAC 1997
    • SAC 1997
    • Salmasizadeh1    Golić2    Dawson3    Simpson4
  • 19
    • 0021489155 scopus 로고
    • Correlation immunity of nonlinear combining functions for cryptographic applications
    • Siegenthaler: Correlation Immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Inform. Theory, IT-30, pp. 776-780, 1984
    • (1984) IEEE Inform. Theory , vol.IT-30 , pp. 776-780
    • Siegenthaler1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.