메뉴 건너뛰기




Volumn 3857 LNCS, Issue , 2006, Pages 203-214

A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation

Author keywords

Algebraic attacks; Cryptanalysis; Decimation; Decoding; Fast correlation attack; Keystream generators; LFSRs; Overdefined systems of nonlinear equations; State transition matrix; Stream ciphers

Indexed keywords

CORRELATION METHODS; CRYPTOGRAPHY; LINEARIZATION; MAPPING; MATRIX ALGEBRA; NONLINEAR CONTROL SYSTEMS;

EID: 33745666500     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11617983_20     Document Type: Conference Paper
Times cited : (11)

References (22)
  • 1
    • 35048861887 scopus 로고    scopus 로고
    • Improving fast algebraic attacks
    • FSE 2004
    • F. Armknecht, "Improving fast algebraic attacks", FSE 2004, Lecture Notes in Computer Science, vol. 3017, pp. 65-82, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 65-82
    • Armknecht, F.1
  • 2
    • 33646825302 scopus 로고    scopus 로고
    • On boolean functions with generalized cryptographic properties
    • INDOCRYPT 2004
    • A. Braeken, V. Nikov, S. Nikova and B. Preneel, "On Boolean functions with generalized cryptographic properties", INDOCRYPT 2004, Lecture Notes in Computer Science, vol. 3348, pp. 120-135, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3348 , pp. 120-135
    • Braeken, A.1    Nikov, V.2    Nikova, S.3    Preneel, B.4
  • 3
    • 84888039254 scopus 로고    scopus 로고
    • Fast correlation attacks: An algorithmic point of view
    • EUROCRYPT 2002
    • P. Chose, A. Joux and M. Mitton, "Fast Correlation Attacks: An Algorithmic Point of View", EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, pp. 209-221, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 209-221
    • Chose, P.1    Joux, A.2    Mitton, M.3
  • 4
    • 35248828626 scopus 로고    scopus 로고
    • Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
    • ICISC2002
    • N.T. Courtois, "Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt", ICISC2002, Lecture Notes in Computer Science, vol. 2587, pp. 182-199, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2587 , pp. 182-199
    • Courtois, N.T.1
  • 5
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • EUROCRYPT2003
    • N.T. Courtois and W. Meier, "Algebraic attacks on stream ciphers with linear feedback", EUROCRYPT2003, Lecture Notes in Computer Science, vol. 2656, pp. 345-359, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 345-359
    • Courtois, N.T.1    Meier, W.2
  • 6
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • CRYPTO2003
    • N.T. Courtois, "Fast algebraic attacks on stream ciphers with linear feedback", CRYPTO2003, Lecture Notes in Computer Science vol. 2729, pp. 176-194, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 176-194
    • Courtois, N.T.1
  • 7
    • 33745658477 scopus 로고    scopus 로고
    • A unified analysis on block decoding approaches for the fast correlation attack
    • Adelaide, Australia, September, Proceedings, (accepted for publication)
    • M. P. C. Fossorier, M. J. Mihaljević and H. Imai, "A Unified Analysis on Block Decoding Approaches for the Fast Correlation attack," 2005 IEEE Int. Symp. Inform. Theory - ISIT 2005, Adelaide, Australia, September 2005, Proceedings, 4 pages (accepted for publication).
    • (2005) 2005 IEEE Int. Symp. Inform. Theory - ISIT 2005
    • Fossorier, M.P.C.1    Mihaljević, M.J.2    Imai, H.3
  • 8
    • 35048843339 scopus 로고    scopus 로고
    • Rewriting variables: The complexity of Fast algebraic attacks on stream ciphers
    • CRYPTO 2004
    • P. Hawkes and G. Rose, "Rewriting variables: The complexity of Fast algebraic attacks on stream ciphers", CRYPTO 2004, Lecture Notes in Computer Science, vol. 3152, pp. 390-406, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 390-406
    • Hawkes, P.1    Rose, G.2
  • 9
    • 0036672635 scopus 로고    scopus 로고
    • Theoretical analysis of a correlation attack based on convolutional codes
    • August
    • T. Johansson and F. Jonsson, "Theoretical Analysis of a Correlation Attack Based on Convolutional Codes," IEEE Trans. Information Theory, vol. 48, pp. 2173-2181, August 2002.
    • (2002) IEEE Trans. Information Theory , vol.48 , pp. 2173-2181
    • Johansson, T.1    Jonsson, F.2
  • 10
    • 33745656851 scopus 로고    scopus 로고
    • A new correlation attack on LFSR sequences with high error tolerance
    • Eds. K. Feng, H. Niederreiter and C. Xing: Birkhauser Verlag AG, May
    • P. Lu, "A new correlation attack on LFSR sequences with high error tolerance", in Coding, Cryptography and Combinatorics, Eds. K. Feng, H. Niederreiter and C. Xing: Birkhauser Verlag AG, May 2004.
    • (2004) Coding, Cryptography and Combinatorics
    • Lu, P.1
  • 12
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," Journal of Cryptology, vol. 1, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 13
    • 35048845264 scopus 로고    scopus 로고
    • Algebraic attacks and decomposition of Boolean functions
    • EUROCRYPT 2004
    • W. Meier, E. Pasalic and C. Carlet, "Algebraic attacks and decomposition of Boolean functions", EUROCRYPT 2004, Lecture Notes in Computer Science, Vol. 3027, pp. 474-491, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 474-491
    • Meier, W.1    Pasalic, E.2    Carlet, C.3
  • 14
    • 0035311895 scopus 로고    scopus 로고
    • On decoding techniques for cryptanalysis of certain encryption algorithms
    • Apr.
    • M. J. Mihaljević, M. P. C. Fossorier and H. Imai, "On decoding techniques for cryptanalysis of certain encryption algorithms," IEICE Trans. Fundamentals, vol. E84-A, pp. 919-930, Apr. 2001.
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , pp. 919-930
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 15
    • 0034269942 scopus 로고    scopus 로고
    • A method for convergence analysis of iterative probabilistic decoding
    • Sept.
    • M. J. Mihaljević and J. Dj. Golić, "A method for convergence analysis of iterative probabilistic decoding," IEEE Trans. Inform. Theory, vol. 46, pp. 2206-2211, Sept. 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 2206-2211
    • Mihaljević, M.J.1    Golić, J.Dj.2
  • 16
    • 84958981368 scopus 로고    scopus 로고
    • Fast correlation attack algorithm with list decoding and an application
    • FSE 2001
    • M. J. Mihaljević, M. P. C. Fossorier and H. Imai, "Fast Correlation Attack Algorithm with List Decoding and an Application", FSE 2001, Lecture Notes in Computer Science, vol. 2355, pp. 196-210, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2355 , pp. 196-210
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 17
    • 0036458332 scopus 로고    scopus 로고
    • Cryptanalysis of TOYOCRYPT-HS1 stream cipher
    • Jan.
    • M. J. Mihaljević and H. Imai, "Cryptanalysis of TOYOCRYPT-HS1 stream cipher", IEICE Transactions on Fundamentals, vol. E85-A, pp. 66-73, Jan. 2002.
    • (2002) IEICE Transactions on Fundamentals , vol.E85-A , pp. 66-73
    • Mihaljević, M.J.1    Imai, H.2
  • 18
    • 0036748614 scopus 로고    scopus 로고
    • Cryptanalysis of fast encryption algorithm for multimedia FEA-M
    • Sept.
    • M. J. Mihaljević and R. Kohno, "Cryptanalysis of fast encryption algorithm for multimedia FEA-M", IEEE Commun. Lett., vol. 6, pp. 382-384, Sept. 2002.
    • (2002) IEEE Commun. Lett. , vol.6 , pp. 382-384
    • Mihaljević, M.J.1    Kohno, R.2
  • 19
    • 23944455950 scopus 로고    scopus 로고
    • The decimated sample based improved algebraic attacks on the nonlinear filters
    • SCN 2004, Jan.
    • M. J. Mihaljević and H. Imai, "The decimated sample based improved algebraic attacks on the nonlinear filters", SCN 2004, Lecture Notes in Computer Science, vol. 3352, pp. 310-323, Jan. 2005.
    • (2005) Lecture Notes in Computer Science , vol.3352 , pp. 310-323
    • Mihaljević, M.J.1    Imai, H.2
  • 20
    • 33646825233 scopus 로고    scopus 로고
    • Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks
    • INDOCRYPT2005, Dec.
    • M. J. Mihaljević, M. P. C. Fossorier and H. Imai, "Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks", INDOCRYPT2005, Lecture Notes in Computer Science, vol. 3707, pp. 155-168, Dec. 2005.
    • (2005) Lecture Notes in Computer Science , vol.3707 , pp. 155-168
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 21
    • 33646826603 scopus 로고    scopus 로고
    • Improved fast correlation attack using low rate codes
    • Cryptography and Coding 2003
    • H. Molland, J.E. Mathiassen and T. Helleseth, "Improved Fast Correlation Attack using Low Rate Codes", Cryptography and Coding 2003, Lecture Notes in Computer Science, vol. 2898, pp. 67-81, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2898 , pp. 67-81
    • Molland, H.1    Mathiassen, J.E.2    Helleseth, T.3
  • 22
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only," IEEE Trans. Comput., vol. C-34, pp. 81-85, 1985.
    • (1985) IEEE Trans. Comput. , vol.C-34 , pp. 81-85
    • Siegenthaler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.