메뉴 건너뛰기




Volumn 3897 LNCS, Issue , 2006, Pages 159-174

On the (im)possibility of practical and secure nonlinear filters and combiners

Author keywords

Algebraic attack; Combination and filter generator; Correlation attack; Distinguishing attack; Hardware complexity

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTER HARDWARE; COMPUTER SCIENCE; CONCRETE BUILDINGS; COSTS; SECURITY OF DATA;

EID: 33745597327     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11693383_11     Document Type: Conference Paper
Times cited : (15)

References (35)
  • 2
    • 24144437725 scopus 로고    scopus 로고
    • Extending the resynchronization attack
    • Helena Handschuh and Anwar Kasan, editors, number 3357 in Lecture Notes in Computer Science, Springer-Verlag
    • Frederik Armknecht, Joseph Lano, and Bart Preneel. Extending the resynchronization attack. In Helena Handschuh and Anwar Kasan, editors, Selected Areas in Cryptography, SAC 2004, number 3357 in Lecture Notes in Computer Science, pages 19-38. Springer-Verlag, 2004.
    • (2004) Selected Areas in Cryptography, SAC 2004 , pp. 19-38
    • Armknecht, F.1    Lano, J.2    Preneel, B.3
  • 4
    • 33744755483 scopus 로고    scopus 로고
    • On the algebraic immunity of symmetric boolean functions
    • K.U. Leuven
    • An Braeken. On the algebraic immunity of symmetric boolean functions. Technical report, K.U. Leuven, 2005.
    • (2005) Technical Report
    • Braeken, A.1
  • 5
    • 33745618450 scopus 로고    scopus 로고
    • On the (im)possibility of practical and secure nonlinear filters and combiners (extended version)
    • An Braeken and Joseph Lano. On the (im)possibility of practical and secure nonlinear filters and combiners (extended version). COSIC technical report, 2005. https://www.cosic.esat.kuleuven.be/publications/.
    • (2005) COSIC Technical Report
    • Braeken, A.1    Lano, J.2
  • 6
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • B. Preneel, editor, number 1807 in Lecture Notes in Computer Science. Springer-Verlag
    • Anne Canteaut and Michael Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pages 573-588. Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 7
  • 9
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • D. Boneh, editor, number 2729 in Lecture Notes in Computer Science, Springer-Verlag
    • Nicolas Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, number 2729 in Lecture Notes in Computer Science, pages 176-194. Springer-Verlag, 2003.
    • (2003) Advances in Cryptology - CRYPTO 2003 , pp. 176-194
    • Courtois, N.1
  • 11
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • E. Biham, editor, number 2656 in Lecture Notes in Computer Science, Springer-Verlag, extended version on eprint
    • Nicolas Courtois and Willi Meier. Algebraic attacks on stream ciphers with linear feedback. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, number 2656 in Lecture Notes in Computer Science, pages 345-359. Springer-Verlag, 2003. extended version on eprint.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 12
    • 85028746172 scopus 로고
    • Resynchronization weaknesses in synchronous stream ciphers
    • T. Helleseth, editor, number 765 in Lecture Notes in Computer Science, Springer-Verlag
    • Joan Daemen, Rene Govaerts, and Joos Vandewalle. Resynchronization weaknesses in synchronous stream ciphers. In T. Helleseth, editor, Advances in Cryptology -EUROCRYPT 1993, number 765 in Lecture Notes in Computer Science, pages 159-167. Springer-Verlag, 1993.
    • (1993) Advances in Cryptology -EUROCRYPT 1993 , pp. 159-167
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 13
    • 26444607970 scopus 로고    scopus 로고
    • Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity
    • H. Gilbert and H. Handschuh, editors, Lecture Notes in Computer Science. Springer-Verlag
    • Deepak Dalai, Kishan Gupta, and Subhamoy Maitra. Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption, FSE 2005, Lecture Notes in Computer Science. Springer-Verlag, 2005.
    • (2005) Fast Software Encryption, FSE 2005
    • Dalai, D.1    Gupta, K.2    Maitra, S.3
  • 16
    • 0035335583 scopus 로고    scopus 로고
    • Ternary m-sequences with three-valued crosscorrelation: New decimations of Welch and Niho type
    • November
    • Hans Dobbertin, Thor Helleseth, Vijay Kumar, and Halvard Martinsen. Ternary m-sequences with three-valued crosscorrelation: New decimations of Welch and Niho type. IEEE Transactions on Information Theory, IT-47-.1473-1481, November 2001.
    • (2001) IEEE Transactions on Information Theory , vol.IT-47 , pp. 1473-1481
    • Dobbertin, H.1    Helleseth, T.2    Kumar, V.3    Martinsen, H.4
  • 17
    • 24144456208 scopus 로고    scopus 로고
    • A new simple technique to attack filter generators and related ciphers
    • Helena Handschuh and Anwar Hasan, editors, number 3357 in LNCS, Springer
    • Hakan Englund and Thomas Johansson. A new simple technique to attack filter generators and related ciphers. In Helena Handschuh and Anwar Hasan, editors, Selected Areas in Cryptography, SAC 2004, number 3357 in LNCS, pages 39-53. Springer, 2004.
    • (2004) Selected Areas in Cryptography, SAC 2004 , pp. 39-53
    • Englund, H.1    Johansson, T.2
  • 19
    • 0030261891 scopus 로고    scopus 로고
    • Computation of low-weight parity-check polynomials
    • Jovan Golic. Computation of low-weight parity-check polynomials. Electronics Letters, 32(21): 1981-1982, 1996.
    • (1996) Electronics Letters , vol.32 , Issue.21 , pp. 1981-1982
    • Golic, J.1
  • 20
    • 35048843339 scopus 로고    scopus 로고
    • Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
    • Matthew Franklin, editor, number 3152 in Lecture Notes in Computer Science, Springer-Verlag
    • Philip Hawkes and Gregory Rose. Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In Matthew Franklin, editor, Advances in Cryptology - CRYPTO 2004, number 3152 in Lecture Notes in Computer Science, pages 390-406. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology - CRYPTO 2004 , pp. 390-406
    • Hawkes, P.1    Rose, G.2
  • 21
    • 0001059304 scopus 로고
    • The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes
    • Tadao Kasami. The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Information and Control, 18:369-394, 1971.
    • (1971) Information and Control , vol.18 , pp. 369-394
    • Kasami, T.1
  • 22
    • 0017017134 scopus 로고
    • An analysis of the structure and complexity of nonlinear binary sequence generators
    • Edwin Key. An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory, 22:732-736, 1976.
    • (1976) IEEE Transactions on Information Theory , vol.22 , pp. 732-736
    • Key, E.1
  • 23
    • 33745624845 scopus 로고
    • Computational method and apparatus for finite field arithmetic. US Patent No. 4, 587,627
    • James Massey and Jimmy Omura. Computational method and apparatus for finite field arithmetic. US Patent No. 4, 587,627, 1986.
    • (1986)
    • Massey, J.1    Omura, J.2
  • 24
    • 35048845264 scopus 로고    scopus 로고
    • Algebraic attacks and decomposition of boolean functions
    • C. Cachin and J. Camenisch, editors, number 3027 in Lecture Notes in Computer Science, Springer-Verlag
    • Willi Meier, Enes Pasalic, and Claude Carlet. Algebraic attacks and decomposition of boolean functions. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, number 3027 in Lecture Notes in Computer Science, pages 474-491. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 474-491
    • Meier, W.1    Pasalic, E.2    Carlet, C.3
  • 25
    • 26444613218 scopus 로고    scopus 로고
    • An improved correlation attack against irregular clocked and filtered keystream generators
    • Matthew Franklin, editor, number 3152 in Lecture Notes in Computer Science, Springer-Verlag
    • Havard Molland and Thor Helleseth. An improved correlation attack against irregular clocked and filtered keystream generators. In Matthew Franklin, editor, Advances in Cryptology - CRYPTO 2004, number 3152 in Lecture Notes in Computer Science, pages 373-389. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology - CRYPTO 2004 , pp. 373-389
    • Molland, H.1    Helleseth, T.2
  • 27
    • 84956974817 scopus 로고    scopus 로고
    • Efficient software implementation for finite field multiplication in normal basis
    • Sihan Qing, Tatsuaki Okamoto, and Jianying Zhou, editors, number 2229 in Lecture Notes in Computer Science, Springer-Verlag
    • Peng Ning and Yiqun Lisa Yin. Efficient software implementation for finite field multiplication in normal basis. In Sihan Qing, Tatsuaki Okamoto, and Jianying Zhou, editors, Third International Conference on Information and Communications Security ICICS 2001, number 2229 in Lecture Notes in Computer Science, pages 177-188. Springer-Verlag, 2001.
    • (2001) Third International Conference on Information and Communications Security ICICS 2001 , pp. 177-188
    • Ning, P.1    Yin, Y.L.2
  • 28
    • 84962968104 scopus 로고
    • Differentially uniform mappings for cryptography
    • T. Helleseth, editor, Eurocrypt 1993, Springer-Verlag
    • Kaisa Nyberg. Differentially uniform mappings for cryptography. In T. Helleseth, editor, Eurocrypt 1993, volume 950 of Lecture Notes in Computer Science, pages 55-64. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.950 , pp. 55-64
    • Nyberg, K.1
  • 29
    • 84968517739 scopus 로고
    • On a special class of polynomials
    • Oystein Ore. On a special class of polynomials. Trans. Amer. Math.Soc., 35:559-584, 1933.
    • (1933) Trans. Amer. Math.Soc. , vol.35 , pp. 559-584
    • Ore, O.1
  • 31
    • 0242493840 scopus 로고    scopus 로고
    • Fast normal basis multiplication using general purpose processors
    • Arash Reyhani-Masoleh and Anwar Hasan. Fast normal basis multiplication using general purpose processors. IEEE Transaction on Computers, 52(3): 1379-1390, 2003.
    • (2003) IEEE Transaction on Computers , vol.52 , Issue.3 , pp. 1379-1390
    • Reyhani-Masoleh, A.1    Hasan, A.2
  • 32
    • 35048849354 scopus 로고    scopus 로고
    • On the applicability of distinguishing attacks against stream ciphers
    • Greg Rose and Philip Hawkes. On the applicability of distinguishing attacks against stream ciphers. In Proceedings of the 3rd NESSIE Workshop, page 6, 2002.
    • (2002) Proceedings of the 3rd NESSIE Workshop , pp. 6
    • Rose, G.1    Hawkes, P.2
  • 34
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • Thomas Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30(5):776-780, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.IT-30 , Issue.5 , pp. 776-780
    • Siegenthaler, T.1
  • 35
    • 34250487811 scopus 로고
    • Gaussian elimination is not optimal
    • Volker Strassen. Gaussian elimination is not optimal. Numerische Mathematik, 13:354-356, 1969.
    • (1969) Numerische Mathematik , vol.13 , pp. 354-356
    • Strassen, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.