메뉴 건너뛰기




Volumn 4047 LNCS, Issue , 2006, Pages 15-29

Cryptanalysis of grain

Author keywords

Correlation attack; Stream cipher; Walsh transform

Indexed keywords

APPROXIMATION THEORY; BOOLEAN FUNCTIONS; FILTRATION; MATHEMATICAL TRANSFORMATIONS;

EID: 33746740431     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11799313_2     Document Type: Conference Paper
Times cited : (55)

References (28)
  • 2
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • B. Preneel, editor, Advances in Cryptology-EUROCRYPT 2000. Springer-Verlag
    • A. Canteaut and M. Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5. In B. Preneel, editor, Advances in Cryptology-EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 573-588. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 3
    • 85030473541 scopus 로고
    • On a fast correlation attack on certain stream ciphers
    • D. W. Davies, editor, Advances in Cryptology-EUROCRYPT'91. Springer-Verlag
    • V. Chepyzhov and B. Smeets. On a fast correlation attack on certain stream ciphers. In D. W. Davies, editor, Advances in Cryptology-EUROCRYPT'91, volume 547 of Lecture Notes in Computer Science, pages 176-185. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 176-185
    • Chepyzhov, V.1    Smeets, B.2
  • 5
    • 84941164456 scopus 로고    scopus 로고
    • IST-2002-507932 Accessed September 29, 2005
    • ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932. Available at http://www.ecrypt.eu.org/stream/, Accessed September 29, 2005, 2005.
    • (2005)
  • 8
    • 24144456208 scopus 로고    scopus 로고
    • A new simple technique to attack filter generators and related ciphers
    • H. Englund and T. Johansson. A new simple technique to attack filter generators and related ciphers. In Selected Areas in Cryptography, pages 39-53, 2004.
    • (2004) Selected Areas in Cryptography , pp. 39-53
    • Englund, H.1    Johansson, T.2
  • 10
    • 84957381006 scopus 로고    scopus 로고
    • Cryptanalysis of alleged A5 stream cipher
    • W. Fumy, editor, Advances in Cryptology-EUROCRYPT'97. Springer-Verlag
    • J.D. Golić. Cryptanalysis of alleged A5 stream cipher. In W. Fumy, editor, Advances in Cryptology-EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 239-255. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 239-255
    • Golić, J.D.1
  • 11
    • 38349004274 scopus 로고    scopus 로고
    • Grain - A stream cipher for constrained environments
    • M. Hell, T. Johansson, and W. Meier, Grain - A Stream Cipher for Constrained Environments. ECRYPT Stream Cipher Project Report 2005/001, 2005. http://www.ecrypt.eu.org/stream.
    • (2005) ECRYPT Stream Cipher Project Report , vol.2005 , Issue.1
    • Hell, M.1    Johansson, T.2    Meier, W.3
  • 13
    • 84957062097 scopus 로고    scopus 로고
    • Fast correlation attacks based on turbo code techniques
    • Advances in Cryptology-CRYPTO'99. Springer-Verlag
    • T. Johansson and F. Jönsson. Fast correlation attacks based on turbo code techniques. In Advances in Cryptology-CRYPTO'99, volume 1666 of Lecture Notes in Computer Science, pages 181-197. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 181-197
    • Johansson, T.1    Jönsson, F.2
  • 14
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attacks on stream ciphers via convolutional codes
    • Advances in Cryptology-EUROCRYPT'99. Springer-Verlag
    • T. Johansson and F. Jönsson. Improved fast correlation attacks on stream ciphers via convolutional codes. In Advances in Cryptology-EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 347-362. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 347-362
    • Johansson, T.1    Jönsson, F.2
  • 15
    • 0141914063 scopus 로고    scopus 로고
    • PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden
    • F. Jönsson. Some Results on Fast Correlation Attacks. PhD thesis, Lund University, Department of Information Technology, P.O. Box 118, SE-221 00, Lund, Sweden, 2002.
    • (2002) Some Results on Fast Correlation Attacks
    • Jönsson, F.1
  • 16
    • 84888039254 scopus 로고    scopus 로고
    • Fast correlation attacks: An algorithmic point of view
    • Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002. Springer-Verlag
    • A. Joux, P. Chose, and M. Mitton. Fast Correlation Attacks: An Algorithmic Point of View. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 209-221. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 209-221
    • Joux, A.1    Chose, P.2    Mitton, M.3
  • 17
    • 84996804416 scopus 로고
    • Linear cryptanalysis using multiple approximations
    • Yvo G. Desmedt, editor, Advances in Cryptology - CRYPTO '94. Springer-Verlag
    • B. S. Jr. Kaliski and M. J. B. Robshaw. Linear Cryptanalysis Using Multiple Approximations. In Yvo G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 26-39. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 26-39
    • Kaliski Jr., B.S.1    Robshaw, M.J.B.2
  • 18
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93. Springer-Verlag
    • M. Matsui. Linear cryptanalysis method for DES cipher. In Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 386-397. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 386-397
    • Matsui, M.1
  • 20
    • 33745650569 scopus 로고
    • Fast correlation attacks on stream ciphers
    • C.G. Günter, editor, Advances in Cryptology-EUROCRYPT'88. Springer-Verlag
    • W. Meier and O. Staffelbach. Fast correlation attacks on stream ciphers. In C.G. Günter, editor, Advances in Cryptology-EUROCRYPT'88, volume 330 of Lecture Notes in Computer Science, pages 301-316. Springer-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 301-316
    • Meier, W.1    Staffelbach, O.2
  • 21
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1(3):159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 22
    • 84948963544 scopus 로고
    • The self-shrinking generator
    • A. De Santis, editor, Advances in Cryptology-EUROCRYPT'94. Springer-Verlag
    • W. Meier and O. Staffelbach. The self-shrinking generator. In A. De Santis, editor, Advances in Cryptology-EUROCRYPT'94, volume 905 of Lecture Notes in Computer Science, pages 205-214. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.905 , pp. 205-214
    • Meier, W.1    Staffelbach, O.2
  • 23
    • 85032480688 scopus 로고
    • A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
    • J. Seberry and J. Pieprzyk, editors, Advances in Cryptology-AUSCRYPT'90. Springer-Verlag
    • M. Mihaljevic and J.D. Golić. A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. In J. Seberry and J. Pieprzyk, editors, Advances in Cryptology-AUSCRYPT'90, volume 453 of Lecture Notes in Computer Science, pages 165-175. Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.453 , pp. 165-175
    • Mihaljevic, M.1    Golić, J.D.2
  • 25
    • 84947926195 scopus 로고
    • Computation of low-weight parity checks for correlation attacks on stream ciphers
    • C. Boyd, editor, Cryptography and Coding - 5th IMA Conference. Springer-Verlag
    • W.T. Penzhorn and G.J. Kühn. Computation of low-weight parity checks for correlation attacks on stream ciphers. In C. Boyd, editor, Cryptography and Coding - 5th IMA Conference, volume 1025 of Lecture Notes in Computer Science, pages 74-83. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1025 , pp. 74-83
    • Penzhorn, W.T.1    Kühn, G.J.2
  • 27
    • 0021489155 scopus 로고
    • Correlation-immunity of non-linear combining functions for cryptographic applications
    • T. Siegenthaler. Correlation-immunity of non-linear combining functions for cryptographic applications. IEEE Transactions on Information Theory, 30:776-780, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.30 , pp. 776-780
    • Siegenthaler, T.1
  • 28
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only, IEEE Transactions on Computers, 34:81-85, 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , pp. 81-85
    • Siegenthaler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.