-
1
-
-
84948981360
-
Searching for the optimum correlation attack
-
Fast Software Encryption 1994, B. Preneel Ed., Springer-Verlag
-
Ross Anderson, Searching for the Optimum Correlation Attack, Fast Software Encryption 1994, Lecture Notes in Computer Science, vol.1008, B. Preneel Ed., Springer-Verlag, pp. 137-143, 1994
-
(1994)
Lecture Notes in Computer Science
, vol.1008
, pp. 137-143
-
-
Anderson, R.1
-
2
-
-
35248840147
-
Algebraic attacks on combiners with memory
-
Advances in Cryptology - CRYPTO 2003, D. Boneh Ed., Springer-Verlag
-
Frederik Armknecht, Matthias Krause, Algebraic Attacks on Combiners with Memory, Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol.2729, D. Boneh Ed., Springer-Verlag, pp. 162-175, 2003
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
3
-
-
24144437725
-
Extending the resynchronization attack
-
Selected Areas in Cryptography - SAC 2004, H. Handschuh and A. Hasan Eds., Springer-Verlag
-
Frederik Armknecht, Joseph Lano, Bart Preneel, Extending the Resynchronization Attack, Selected Areas in Cryptography - SAC 2004, Lecture Notes in Computer Science, vol. 3357, H. Handschuh and A. Hasan Eds., Springer-Verlag, pp. 19-38, 2005 (extended version available at http://eprint.iacr.org/2004/232)
-
(2005)
Lecture Notes in Computer Science
, vol.3357
, pp. 19-38
-
-
Armknecht, F.1
Lano, J.2
Preneel, B.3
-
5
-
-
35048894397
-
How far can we go beyond linear cryptanalysis?
-
Advances in Cryptology - ASIACRYPT 2004, P. J. Lee Ed., Springer-Verlag
-
Thomas Baignères, Pascal Junod, Serge Vaudenay, How Far Can We Go Beyond Linear Cryptanalysis?, Advances in Cryptology - ASIACRYPT 2004, Lecture Notes in Computer Science, vol.3329, P. J. Lee Ed., Springer-Verlag, pp. 432-450, 2004
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 432-450
-
-
Baignères, T.1
Junod, P.2
Vaudenay, S.3
-
6
-
-
33646800113
-
-
November
-
Bluetooth™, Bluetooth Specification, version 1.2, pp. 903-948, November, 2003, available at http://irww.bluetooth.org
-
(2003)
Bluetooth Specification, Version 1.2
, pp. 903-948
-
-
-
7
-
-
84948963512
-
Improved fast correlation attacks using paritycheck equations of weight 4 and 5
-
Advances in Cryptology - EUROCRYPT 2000, B. Preneel Ed., Springer-Verlag
-
Anne Canteaut, Michael Trabbia, Improved Fast Correlation Attacks Using Paritycheck Equations of Weight 4 and 5, Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, vol.1807, B. Preneel Ed., Springer-Verlag, pp. 573-588, 2000
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
8
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
Fast Software Encryption 2000, B. Schneier Ed., Springer-Verlag
-
Vladimir V. Chepyzhov, Thomas Johansson, Ben Smeets, A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol.1978, B. Schneier Ed., Springer-Verlag, pp. 181-195, 2000
-
(2000)
Lecture Notes in Computer Science
, vol.1978
, pp. 181-195
-
-
Chepyzhov, V.V.1
Johansson, T.2
Smeets, B.3
-
9
-
-
84888039254
-
Fast correlation attacks: An algorithmic point of view
-
Advances in Cryptology - EUROCRYPT 2002, L. R. Knudsen Ed., Springer-Verlag
-
Philippe Chose, Antoine Joux, Michel Mitton, Fast Correlation Attacks: An Algorithmic Point of View, Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, vol.2332, L. R. Knudsen Ed., Springer-Verlag, pp. 209-221, 2002
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 209-221
-
-
Chose, P.1
Joux, A.2
Mitton, M.3
-
10
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
Advances in Cryptology - CRYPTO 2003, D. Boneh Ed., Springer-Verlag
-
Nicolas T. Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol.2729, D. Boneh Ed., Springer-Verlag, pp. 176-194, 2003
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 176-194
-
-
Courtois, N.T.1
-
13
-
-
84949226395
-
Analysis of the E0 encryption system
-
Selected Areas in Cryptography - SAC 2001, S. Vaudenay and A. Youssef Eds., Springer-Verlag
-
Scott Fluhrer, Stefan Lucks, Analysis of the E0 Encryption System, Selected Areas in Cryptography - SAC 2001, Lecture Notes in Computer Science, vol. 2259, S. Vaudenay and A. Youssef Eds., Springer-Verlag, pp. 38-48, 2001
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 38-48
-
-
Fluhrer, S.1
Lucks, S.2
-
15
-
-
0242549872
-
Correlation properties of a general binary combiner with memory
-
Nov.
-
Jovan Dj. Golić, Correlation Properties of a General Binary Combiner with Memory, Journal of Cryptology, vol. 9, pp. 111-126, Nov. 1996
-
(1996)
Journal of Cryptology
, vol.9
, pp. 111-126
-
-
Golić, J.Dj.1
-
16
-
-
84947279371
-
Linear cryptanalysis of bluetooth stream cipher
-
Advances in Cryptology - EUROCRYPT 2002, L. R. Knudsen Ed., Springer-Verlag
-
Jovan Dj. Golić, Vittorio Bagini, Guglielmo Morgari, Linear Cryptanalysis of Bluetooth Stream Cipher, Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, L. R. Knudsen Ed., Springer-Verlag, pp. 238-255, 2002
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 238-255
-
-
Golić, J.Dj.1
Bagini, V.2
Morgari, G.3
-
17
-
-
84958740066
-
Correlation properties of the bluetooth combiner
-
Information Security and Cryptology - ICISC'99, JooSeok. Song Ed., Springer-Verlag
-
Miia Hermelin, Kaisa Nyberg, Correlation Properties of the Bluetooth Combiner, Information Security and Cryptology - ICISC'99, Lecture Notes in Computer Science, vol. 1787, JooSeok. Song Ed., Springer-Verlag, pp. 17-29, 2000
-
(2000)
Lecture Notes in Computer Science
, vol.1787
, pp. 17-29
-
-
Hermelin, M.1
Nyberg, K.2
-
18
-
-
84957062097
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
Advances in Cryptology - CRYPTO'99, M. Wiener Ed., Springer-Verlag
-
Thomas Johansson, Frederik Jönsson, Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes, Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science, vol.1666, M. Wiener Ed., Springer-Verlag, pp. 181-197, 1999
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
19
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials
-
Advances in Cryptology - CRYPTO 2000, M. Bellare Ed., Springer-Verlag
-
Thomas Johansson, Frederik Jönsson, Fast Correlation Attacks through Reconstruction of Linear Polynomials, Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, vol.1880, M. Bellare Ed., Springer-Verlag, pp. 300-315, 2000
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jönsson, F.2
-
20
-
-
84935039488
-
BDD-based cryptanalysis of keystream generators
-
Advances in Cryptology - EUROCRYPT 2002, L. R. Knudsen Ed., Springer-Verlag
-
Matthias Krause, BDD-Based Cryptanalysis of Keystream Generators, Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, L. R. Knudsen Ed., Springer-Verlag, pp. 222-237, 2002
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 222-237
-
-
Krause, M.1
-
21
-
-
84955622043
-
Conditional correlation attack on nonlinear filter generators
-
Advances in Cryptology - ASI-ACRYPT 1996, Kwangjo Kim and Tsutomu Matsumoto Eds., Springer-Verlag
-
Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sungmo Park, Conditional Correlation Attack on Nonlinear Filter Generators, Advances in Cryptology - ASI-ACRYPT 1996, Lecture Notes in Computer Science, vol.1163, Kwangjo Kim and Tsutomu Matsumoto Eds., Springer-Verlag, pp. 360-367, 1996
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 360-367
-
-
Lee, S.1
Chee, S.2
Park, S.3
Park, S.4
-
23
-
-
35048894912
-
Faster correlation attack on bluetooth keystream generator EO
-
Advances in Cryptology - CRYPTO 2004, M. Franklin Ed., Springer-Verlag
-
Yi Lu, Serge Vaudenay, Faster Correlation Attack on Bluetooth Keystream Generator EO, Advances in Cryptology - CRYPTO 2004, Lecture Notes in Computer Science, vol.3152, M. Franklin Ed., Springer-Verlag, pp. 407-425, 2004
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 407-425
-
-
Lu, Y.1
Vaudenay, S.2
-
24
-
-
33646848015
-
Cryptanalysis of Bluetooth keystream generator two-level EO
-
Advances in Cryptology - ASIACRYPT 2004, P. J. Lee Ed., Springer-Verlag
-
Yi Lu, Serge Vaudenuy, Cryptanalysis of Bluetooth Keystream Generator Two-level EO, Advances in Cryptology - ASIACRYPT 2004, Lecture Notes in Computer Science, vol.3329, P. J. Lee Ed., Springer-Verlag, pp. 483-499, 2004
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 483-499
-
-
Lu, Y.1
Vaudenuy, S.2
-
25
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Advances in Cryptology - EUROCRYPT'93, Springer-Verlag
-
Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science, vol.765, Springer-Verlag, pp. 386-397, 1993
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
26
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
Nov.
-
Willi Meier, Othmar Staffelbach, Fast Correlation Attacks on Certain Stream Ciphers, Journal of Cryptology, vol. 1, pp. 159-176, Nov. 1989
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
27
-
-
0026678847
-
Correlation properties of combiners with memory in stream ciphers
-
Nov.
-
Willi Meier, Othmar Staffelbach, Correlation Properties of Combiners with Memory in Stream Ciphers, Journal of Cryptology, vol. 5, pp. 67-86, Nov. 1992
-
(1992)
Journal of Cryptology
, vol.5
, pp. 67-86
-
-
Meier, W.1
Staffelbach, O.2
-
30
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
Jan.
-
Thomas Siegenthaler, Decrypting a class of Stream Ciphers using Ciphertext only, IEEE Transactions on Computers, vol. C-34, pp. 81-85, Jan. 1985
-
(1985)
IEEE Transactions on Computers
, vol.C-34
, pp. 81-85
-
-
Siegenthaler, T.1
|