-
1
-
-
35048861887
-
Improving fast algebraic attacks
-
F. Armknecht. Improving fast algebraic attacks. FSE, pages 65-82, 2004.
-
(2004)
FSE
, pp. 65-82
-
-
Armknecht, F.1
-
2
-
-
35248840147
-
Algebraic attacks on combiners with memory
-
F. Armknecht and M. Krause. Algebraic attacks on combiners with memory. Crypto, pages 162-175, 2003.
-
(2003)
Crypto
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
3
-
-
85034420736
-
The stop-and-go generator
-
T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology: Proceedings of Eurocrypt 84, Springer-Verlag
-
T. Both and F. C. Piper. The stop-and-go generator. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology: Proceedings of Eurocrypt 84, volume 209 of Lecture Notes in Computer Science, pages 88-92. Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 88-92
-
-
Both, T.1
Piper, F.C.2
-
4
-
-
0034295410
-
Embedding attacks on step[1..D] clock controlled generators
-
W. G. Chambers and D. Gollmann, Embedding attacks on step[1..D] clock controlled generators. Electronics Letters, 36, pages 1771-1773, 2000.
-
(2000)
Electronics Letters
, vol.36
, pp. 1771-1773
-
-
Chambers, W.G.1
Gollmann, D.2
-
5
-
-
33747612098
-
Lock-in effect in cascades of clock-controlled shift-registers
-
Christoph G. Günther,editor,Advances in Cryptology: Proceedings of Eurocrypt 88, Springer-Verlag
-
W. G. Chambers and D. Gollmann. Lock-in Effect in Cascades of Clock-Controlled Shift-Registers. In Christoph G. Günther,editor,Advances in Cryptology: Proceedings of Eurocrypt 88,volume 330 of Lecture Notes in Computer Science, pages 381-344. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 381-1344
-
-
Chambers, W.G.1
Gollmann, D.2
-
6
-
-
26444495490
-
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering
-
J. Y. Cho and J. Pieprzyk. Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. FSE, pages 49-64, 2004.
-
(2004)
FSE
, pp. 49-64
-
-
Cho, J.Y.1
Pieprzyk, J.2
-
7
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristic two
-
D. Coppersmith. Fast evaluation of logarithms in fields of characteristic two. IEEE Transactions on Information Theory, 30(4), pages 587-593, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, Issue.4
, pp. 587-593
-
-
Coppersmith, D.1
-
8
-
-
84937560136
-
The security of hidden field equations (HFE)
-
N. Courtois. The security of hidden field equations (HFE). CT-RSA, pages 266-281, 2001.
-
(2001)
CT-RSA
, pp. 266-281
-
-
Courtois, N.1
-
9
-
-
35248828626
-
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
-
N. Courtois. Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt. ICISC, pages 182-199, 2002.
-
(2002)
ICISC
, pp. 182-199
-
-
Courtois, N.1
-
10
-
-
9944222309
-
Algebraic attacks on combiners with memory and several outputs
-
N. Courtois. Algebraic attacks on combiners with memory and several outputs. Cryptology ePrint Archive, Report 2003/125, 2003.
-
(2003)
Cryptology EPrint Archive, Report
, vol.2003
, Issue.125
-
-
Courtois, N.1
-
11
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
N. Courtois. Fast algebraic attacks on stream ciphers with linear feedback. Crypto, pages 176-194, 2003.
-
(2003)
Crypto
, pp. 176-194
-
-
Courtois, N.1
-
13
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. Asiacrypt, pages 267-287, 2002.
-
(2002)
Asiacrypt
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
14
-
-
84958673691
-
Edit distance correlation attack on the alternating step generator
-
Burton S. Kaliski Jr., editor, Advances in Cryptology-Crypto '97, Springer-Verlag
-
J. Dj. Golić and R. Menicocci. Edit distance correlation attack on the alternating step generator. In Burton S. Kaliski Jr., editor, Advances in Cryptology-Crypto '97, volume 1294 of Lecture Notes in Computer Science, pages 499-512. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 499-512
-
-
Golić, J.D.1
Menicocci, R.2
-
15
-
-
0742321821
-
Correlation analysis of the alternating step generator
-
J. Dj. Golić and R. Menicocci. Correlation analysis of the alternating step generator. Des. Codes Cryptography, 31(1), pages 51-74, 2004.
-
(2004)
Des. Codes Cryptography
, vol.31
, Issue.1
, pp. 51-74
-
-
Golić, J.D.1
Menicocci, R.2
-
17
-
-
85034847491
-
Alternating step generators controlled by de Bruijn sequences
-
David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, Springer-Verlag
-
C. G. Günther, alternating step generators controlled by de Bruijn sequences. In David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, volume 304 of Lecture Notes in Computer Science, pages 5-14. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.304
, pp. 5-14
-
-
Günther, C.G.1
-
18
-
-
3042608572
-
-
PhD thesis, Royal Holloway and Bedford New College, University of London, Egham, London
-
A. A. Kanso, Clock-Controlled Generators. PhD thesis, Royal Holloway and Bedford New College, University of London, Egham, London, 1999.
-
(1999)
Clock-controlled Generators
-
-
Kanso, A.A.1
-
19
-
-
84941163524
-
-
http://magma.maths.usyd.edu.au/.
-
-
-
-
20
-
-
35048823393
-
Improved linear consistency attack on irregular clocked keystream generators
-
H. Molland. Improved linear consistency attack on irregular clocked keystream generators. FSE, pages 109-126, 2004.
-
(2004)
FSE
, pp. 109-126
-
-
Molland, H.1
-
21
-
-
84945174447
-
When shift registers clock themselves
-
David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, Springer-Verlag
-
R. A. Rueppel. When shift registers clock themselves. In David Chaum and Wyn L. Price, editors, Advances in Cryptology-Eurocrypt 87, volume 304 of Lecture Notes in Computer Science, pages 53-56. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.304
, pp. 53-56
-
-
Rueppel, R.A.1
-
23
-
-
0003819410
-
-
R. A. Rueppel, editor. Springer-Verlag, Berlin
-
R. A. Rueppel, editor. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986.
-
(1986)
Analysis and Design of Stream Ciphers
-
-
-
25
-
-
0022583143
-
Solving sparse linear equations over finite fields
-
D. H. Wiedemann. Solving sparse linear equations over finite fields. IEEE Transactions on Information Theory, 32(1), pages 54-62, 1986.
-
(1986)
IEEE Transactions on Information Theory
, vol.32
, Issue.1
, pp. 54-62
-
-
Wiedemann, D.H.1
-
26
-
-
84955610054
-
An improved linear syndrome algorithm in cryptanalysis with application
-
A. J. Menezes and S. A. Vanstone, editors, Advances in Cryptology-Crypto '90, Springer-Verlag
-
K. Zeng, C. H. Yang and T. R. N. Rao. An improved linear syndrome algorithm in cryptanalysis with application. In A. J. Menezes and S. A. Vanstone, editors, Advances in Cryptology-Crypto '90, volume 537 of Lecture Notes in Computer Science, pages 34-47. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 34-47
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.N.3
-
27
-
-
27844468358
-
On the efficiency of the clock control guessing attack
-
E. Zenner. On the efficiency of the clock control guessing attack. ICISC, pages 200-212, 2002.
-
(2002)
ICISC
, pp. 200-212
-
-
Zenner, E.1
-
28
-
-
0026219481
-
An algorithm for the initial state reconstruction of the clock-controlled shift register
-
M. V. Zivkovic. An algorithm for the initial state reconstruction of the clock-controlled shift register. IEEE Transactions on Information Theory, 37(5), page 1488, 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.5
, pp. 1488
-
-
Zivkovic, M.V.1
|