-
2
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
B. Preneel, editor, Advances in Cryptology-EUROCRYPT 2000. Springer-Verlag
-
A. Canteaut and M. Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5. In B. Preneel, editor, Advances in Cryptology-EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 573-588. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
3
-
-
85030473541
-
On a fast correlation attack on certain stream ciphers
-
D. W. Davies, editor, Advances in Cryptology-EUROCRYPT'91. Springer-Verlag
-
V. Chepyzhov and B. Smeets. On a fast correlation attack on certain stream ciphers. In D. W. Davies, editor, Advances in Cryptology-EUROCRYPT'91, volume 547 of Lecture Notes in Computer Science, pages 176-185. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
5
-
-
84941164456
-
-
IST-2002-507932 Accessed September 29, 2005
-
ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932. Available at http://www.ecrypt.eu.org/stream/, Accessed September 29, 2005, 2005.
-
(2005)
-
-
-
8
-
-
24144456208
-
A new simple technique to attack filter generators and related ciphers
-
H. Englund and T. Johansson. A new simple technique to attack filter generators and related ciphers. In Selected Areas in Cryptography, pages 39-53, 2004.
-
(2004)
Selected Areas in Cryptography
, pp. 39-53
-
-
Englund, H.1
Johansson, T.2
-
10
-
-
84957381006
-
Cryptanalysis of alleged A5 stream cipher
-
W. Fumy, editor, Advances in Cryptology-EUROCRYPT'97. Springer-Verlag
-
J.D. Golić. Cryptanalysis of alleged A5 stream cipher. In W. Fumy, editor, Advances in Cryptology-EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 239-255. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 239-255
-
-
Golić, J.D.1
-
11
-
-
38349004274
-
Grain - A stream cipher for constrained environments
-
M. Hell, T. Johansson, and W. Meier, Grain - A Stream Cipher for Constrained Environments. ECRYPT Stream Cipher Project Report 2005/001, 2005. http://www.ecrypt.eu.org/stream.
-
(2005)
ECRYPT Stream Cipher Project Report
, vol.2005
, Issue.1
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
13
-
-
84957062097
-
Fast correlation attacks based on turbo code techniques
-
Advances in Cryptology-CRYPTO'99. Springer-Verlag
-
T. Johansson and F. Jönsson. Fast correlation attacks based on turbo code techniques. In Advances in Cryptology-CRYPTO'99, volume 1666 of Lecture Notes in Computer Science, pages 181-197. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
14
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
Advances in Cryptology-EUROCRYPT'99. Springer-Verlag
-
T. Johansson and F. Jönsson. Improved fast correlation attacks on stream ciphers via convolutional codes. In Advances in Cryptology-EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 347-362. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jönsson, F.2
-
15
-
-
0141914063
-
-
PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden
-
F. Jönsson. Some Results on Fast Correlation Attacks. PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden, 2002.
-
(2002)
Some Results on Fast Correlation Attacks
-
-
Jönsson, F.1
-
16
-
-
84888039254
-
Fast correlation attacks: An algorithmic point of view
-
Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002. Springer-Verlag
-
A. Joux, P. Chose, and M. Mitton. Fast Correlation Attacks: An Algorithmic Point of View. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 209-221. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 209-221
-
-
Joux, A.1
Chose, P.2
Mitton, M.3
-
17
-
-
84996804416
-
Linear cryptanalysis using multiple approximations
-
Yvo G. Desmedt, editor, Advances in Cryptology - CRYPTO '94. Springer-Verlag
-
B. S. Jr. Kaliski and M. J. B. Robshaw. Linear Cryptanalysis Using Multiple Approximations. In Yvo G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 26-39. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 26-39
-
-
Kaliski Jr., B.S.1
Robshaw, M.J.B.2
-
18
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93. Springer-Verlag
-
M. Matsui. Linear cryptanalysis method for DES cipher. In Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 386-397. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
20
-
-
33745650569
-
Fast correlation attacks on stream ciphers
-
C.G. Günter, editor, Advances in Cryptology-EUROCRYPT'88. Springer-Verlag
-
W. Meier and O. Staffelbach. Fast correlation attacks on stream ciphers. In C.G. Günter, editor, Advances in Cryptology-EUROCRYPT'88, volume 330 of Lecture Notes in Computer Science, pages 301-316. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 301-316
-
-
Meier, W.1
Staffelbach, O.2
-
21
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1(3):159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
22
-
-
84948963544
-
The self-shrinking generator
-
A. De Santis, editor, Advances in Cryptology-EUROCRYPT'94. Springer-Verlag
-
W. Meier and O. Staffelbach. The self-shrinking generator. In A. De Santis, editor, Advances in Cryptology-EUROCRYPT'94, volume 905 of Lecture Notes in Computer Science, pages 205-214. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.905
, pp. 205-214
-
-
Meier, W.1
Staffelbach, O.2
-
23
-
-
85032480688
-
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
-
J. Seberry and J. Pieprzyk, editors, Advances in Cryptology-AUSCRYPT'90. Springer-Verlag
-
M. Mihaljevic and J.D. Golić. A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. In J. Seberry and J. Pieprzyk, editors, Advances in Cryptology-AUSCRYPT'90, volume 453 of Lecture Notes in Computer Science, pages 165-175. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.453
, pp. 165-175
-
-
Mihaljevic, M.1
Golić, J.D.2
-
25
-
-
84947926195
-
Computation of low-weight parity checks for correlation attacks on stream ciphers
-
C. Boyd, editor, Cryptography and Coding - 5th IMA Conference. Springer-Verlag
-
W.T. Penzhorn and G.J. Kühn. Computation of low-weight parity checks for correlation attacks on stream ciphers. In C. Boyd, editor, Cryptography and Coding - 5th IMA Conference, volume 1025 of Lecture Notes in Computer Science, pages 74-83. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1025
, pp. 74-83
-
-
Penzhorn, W.T.1
Kühn, G.J.2
-
27
-
-
0021489155
-
Correlation-immunity of non-linear combining functions for cryptographic applications
-
T. Siegenthaler. Correlation-immunity of non-linear combining functions for cryptographic applications. IEEE Transactions on Information Theory, 30:776-780, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, pp. 776-780
-
-
Siegenthaler, T.1
-
28
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only, IEEE Transactions on Computers, 34:81-85, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, pp. 81-85
-
-
Siegenthaler, T.1
|