메뉴 건너뛰기




Volumn 4058 LNCS, Issue , 2006, Pages 1-16

Algebraic attacks on clock-controlled stream ciphers

Author keywords

Algebraic attack; Clock control; Irregular clocking; Linear feedback shift register; Stream cipher

Indexed keywords

COMPUTER PROGRAMMING; CONTROL SYSTEMS; EQUATIONS OF STATE; FEEDBACK; SYSTEMS ANALYSIS;

EID: 33746335696     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11780656_1     Document Type: Conference Paper
Times cited : (16)

References (28)
  • 1
    • 35048861887 scopus 로고    scopus 로고
    • Improving fast algebraic attacks
    • F. Armknecht. Improving fast algebraic attacks. FSE, pages 65-82, 2004.
    • (2004) FSE , pp. 65-82
    • Armknecht, F.1
  • 2
    • 35248840147 scopus 로고    scopus 로고
    • Algebraic attacks on combiners with memory
    • F. Armknecht and M. Krause. Algebraic attacks on combiners with memory. Crypto, pages 162-175, 2003.
    • (2003) Crypto , pp. 162-175
    • Armknecht, F.1    Krause, M.2
  • 3
    • 85034420736 scopus 로고
    • The stop-and-go generator
    • T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology: Proceedings of Eurocrypt 84, Springer-Verlag
    • T. Both and F. C. Piper. The stop-and-go generator. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology: Proceedings of Eurocrypt 84, volume 209 of Lecture Notes in Computer Science, pages 88-92. Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.209 , pp. 88-92
    • Both, T.1    Piper, F.C.2
  • 4
    • 0034295410 scopus 로고    scopus 로고
    • Embedding attacks on step[1..D] clock controlled generators
    • W. G. Chambers and D. Gollmann, Embedding attacks on step[1..D] clock controlled generators. Electronics Letters, 36, pages 1771-1773, 2000.
    • (2000) Electronics Letters , vol.36 , pp. 1771-1773
    • Chambers, W.G.1    Gollmann, D.2
  • 5
    • 33747612098 scopus 로고
    • Lock-in effect in cascades of clock-controlled shift-registers
    • Christoph G. Günther,editor,Advances in Cryptology: Proceedings of Eurocrypt 88, Springer-Verlag
    • W. G. Chambers and D. Gollmann. Lock-in Effect in Cascades of Clock-Controlled Shift-Registers. In Christoph G. Günther,editor,Advances in Cryptology: Proceedings of Eurocrypt 88,volume 330 of Lecture Notes in Computer Science, pages 381-344. Springer-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 381-1344
    • Chambers, W.G.1    Gollmann, D.2
  • 6
    • 26444495490 scopus 로고    scopus 로고
    • Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering
    • J. Y. Cho and J. Pieprzyk. Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. FSE, pages 49-64, 2004.
    • (2004) FSE , pp. 49-64
    • Cho, J.Y.1    Pieprzyk, J.2
  • 7
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • D. Coppersmith. Fast evaluation of logarithms in fields of characteristic two. IEEE Transactions on Information Theory, 30(4), pages 587-593, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.30 , Issue.4 , pp. 587-593
    • Coppersmith, D.1
  • 8
    • 84937560136 scopus 로고    scopus 로고
    • The security of hidden field equations (HFE)
    • N. Courtois. The security of hidden field equations (HFE). CT-RSA, pages 266-281, 2001.
    • (2001) CT-RSA , pp. 266-281
    • Courtois, N.1
  • 9
    • 35248828626 scopus 로고    scopus 로고
    • Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
    • N. Courtois. Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt. ICISC, pages 182-199, 2002.
    • (2002) ICISC , pp. 182-199
    • Courtois, N.1
  • 10
    • 9944222309 scopus 로고    scopus 로고
    • Algebraic attacks on combiners with memory and several outputs
    • N. Courtois. Algebraic attacks on combiners with memory and several outputs. Cryptology ePrint Archive, Report 2003/125, 2003.
    • (2003) Cryptology EPrint Archive, Report , vol.2003 , Issue.125
    • Courtois, N.1
  • 11
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • N. Courtois. Fast algebraic attacks on stream ciphers with linear feedback. Crypto, pages 176-194, 2003.
    • (2003) Crypto , pp. 176-194
    • Courtois, N.1
  • 13
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. Asiacrypt, pages 267-287, 2002.
    • (2002) Asiacrypt , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 14
    • 84958673691 scopus 로고    scopus 로고
    • Edit distance correlation attack on the alternating step generator
    • Burton S. Kaliski Jr., editor, Advances in Cryptology-Crypto '97, Springer-Verlag
    • J. Dj. Golić and R. Menicocci. Edit distance correlation attack on the alternating step generator. In Burton S. Kaliski Jr., editor, Advances in Cryptology-Crypto '97, volume 1294 of Lecture Notes in Computer Science, pages 499-512. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 499-512
    • Golić, J.D.1    Menicocci, R.2
  • 15
    • 0742321821 scopus 로고    scopus 로고
    • Correlation analysis of the alternating step generator
    • J. Dj. Golić and R. Menicocci. Correlation analysis of the alternating step generator. Des. Codes Cryptography, 31(1), pages 51-74, 2004.
    • (2004) Des. Codes Cryptography , vol.31 , Issue.1 , pp. 51-74
    • Golić, J.D.1    Menicocci, R.2
  • 17
    • 85034847491 scopus 로고
    • Alternating step generators controlled by de Bruijn sequences
    • David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, Springer-Verlag
    • C. G. Günther, alternating step generators controlled by de Bruijn sequences. In David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, volume 304 of Lecture Notes in Computer Science, pages 5-14. Springer-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science , vol.304 , pp. 5-14
    • Günther, C.G.1
  • 18
    • 3042608572 scopus 로고    scopus 로고
    • PhD thesis, Royal Holloway and Bedford New College, University of London, Egham, London
    • A. A. Kanso, Clock-Controlled Generators. PhD thesis, Royal Holloway and Bedford New College, University of London, Egham, London, 1999.
    • (1999) Clock-controlled Generators
    • Kanso, A.A.1
  • 19
    • 84941163524 scopus 로고    scopus 로고
    • http://magma.maths.usyd.edu.au/.
  • 20
    • 35048823393 scopus 로고    scopus 로고
    • Improved linear consistency attack on irregular clocked keystream generators
    • H. Molland. Improved linear consistency attack on irregular clocked keystream generators. FSE, pages 109-126, 2004.
    • (2004) FSE , pp. 109-126
    • Molland, H.1
  • 21
    • 84945174447 scopus 로고
    • When shift registers clock themselves
    • David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, Springer-Verlag
    • R. A. Rueppel. When shift registers clock themselves. In David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, volume 304 of Lecture Notes in Computer Science, pages 53-56. Springer-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science , vol.304 , pp. 53-56
    • Rueppel, R.A.1
  • 23
    • 0003819410 scopus 로고
    • R. A. Rueppel, editor. Springer-Verlag, Berlin
    • R. A. Rueppel, editor. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986.
    • (1986) Analysis and Design of Stream Ciphers
  • 25
    • 0022583143 scopus 로고
    • Solving sparse linear equations over finite fields
    • D. H. Wiedemann. Solving sparse linear equations over finite fields. IEEE Transactions on Information Theory, 32(1), pages 54-62, 1986.
    • (1986) IEEE Transactions on Information Theory , vol.32 , Issue.1 , pp. 54-62
    • Wiedemann, D.H.1
  • 26
    • 84955610054 scopus 로고
    • An improved linear syndrome algorithm in cryptanalysis with application
    • A. J. Menezes and S. A. Vanstone, editors, Advances in Cryptology-Crypto '90, Springer-Verlag
    • K. Zeng, C. H. Yang and T. R. N. Rao. An improved linear syndrome algorithm in cryptanalysis with application. In A. J. Menezes and S. A. Vanstone, editors, Advances in Cryptology-Crypto '90, volume 537 of Lecture Notes in Computer Science, pages 34-47. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 34-47
    • Zeng, K.1    Yang, C.H.2    Rao, T.R.N.3
  • 27
    • 27844468358 scopus 로고    scopus 로고
    • On the efficiency of the clock control guessing attack
    • E. Zenner. On the efficiency of the clock control guessing attack. ICISC, pages 200-212, 2002.
    • (2002) ICISC , pp. 200-212
    • Zenner, E.1
  • 28
    • 0026219481 scopus 로고
    • An algorithm for the initial state reconstruction of the clock-controlled shift register
    • M. V. Zivkovic. An algorithm for the initial state reconstruction of the clock-controlled shift register. IEEE Transactions on Information Theory, 37(5), page 1488, 1991.
    • (1991) IEEE Transactions on Information Theory , vol.37 , Issue.5 , pp. 1488
    • Zivkovic, M.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.