메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 176-194

Fast algebraic attacks on stream ciphers with linear feedback

Author keywords

Algebraic attacks; Berlekamp Massey algorithm; Bluetooth; Boolean functions; Combiners with memory; Cryptrec; E0; LFSR synthesis; LILI 128; Multivariate equations; Nessie; Nonlinear filters; Stream ciphers; Toyocrypt

Indexed keywords

ALGEBRA; ALGORITHMS; BLUETOOTH; BOOLEAN FUNCTIONS; NONLINEAR EQUATIONS; NONLINEAR FILTERING; POLYNOMIAL APPROXIMATION; STORAGE ALLOCATION (COMPUTER);

EID: 35248849880     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_11     Document Type: Article
Times cited : (436)

References (27)
  • 2
    • 35248840147 scopus 로고    scopus 로고
    • Algebraic Atacks on Combiners with Memory
    • these proceedings, Crypto 2003, Springer
    • Frederik Armknecht, Matthias Krause: Algebraic Atacks on Combiners with Memory, in these proceedings, Crypto 2003, LNCS 2729, Springer, 2003.
    • (2003) LNCS , vol.2729
    • Armknecht, F.1    Krause, M.2
  • 3
    • 84948981360 scopus 로고
    • Searching for the Optimum Correlation Attack
    • FSE'94, Springer
    • Ross Anderson: Searching for the Optimum Correlation Attack, FSE'94, LNCS 1008, pp 137-143, Springer. 1994.
    • (1994) LNCS , vol.1008 , pp. 137-143
    • Anderson, R.1
  • 4
    • 33745835817 scopus 로고    scopus 로고
    • Cryptanalysis of LILI-128
    • 22 January
    • Steve Babbage: Cryptanalysis of LILI-128, Nessie project internal report, https://www.cosic.esat.kuleuven.ac.be/nessie/reports/, 22 January 2001.
    • (2001) Nessie Project Internal Report
    • Babbage, S.1
  • 7
    • 84983014125 scopus 로고
    • Fast solution of Toeplitz systems of equations and computation of Padé approximants
    • R. P. Brent, F. G. Gustavson, D. Y. Y. Yun: Fast solution of Toeplitz systems of equations and computation of Padé approximants. J. Algorithms, 1:259-295, 1980.
    • (1980) J. Algorithms , vol.1 , pp. 259-295
    • Brent, R.P.1    Gustavson, F.G.2    Yun, D.Y.Y.3
  • 9
    • 85002229923 scopus 로고
    • On Correlation-immune Functions
    • Crypto'91, Springer
    • Paul Camion, Claude Carlet, Pascale Charpin and Nicolas Sendrier, On Correlation-immune Functions, Crypto'91, LNCS 576, pp. 86-100, Springer, 1991.
    • (1991) LNCS , vol.576 , pp. 86-100
    • Camion, P.1    Carlet, C.2    Charpin, P.3    Sendrier, N.4
  • 10
    • 35248828626 scopus 로고    scopus 로고
    • Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
    • ICISC 2002, Springer. An updated version
    • Nicolas Courtois: Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt, ICISC 2002, LNCS 2587, Springer. An updated version (2002) is available at http://eprint.iacr.org/2002/087/.
    • (2002) LNCS , vol.2587
    • Courtois, N.1
  • 11
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic Attacks on Stream Ciphers with Linear Feedback
    • Eurocrypt 2003, Warsaw, Poland, Springer. An extended version is
    • Nicolas Courtois and Willi Meier: Algebraic Attacks on Stream Ciphers with Linear Feedback, Eurocrypt 2003, Warsaw, Poland, LNCS 2656, pp. 345-359, Springer. An extended version is available at http://www.minrank.org/toyolili.pdf
    • LNCS , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 12
    • 84937560136 scopus 로고    scopus 로고
    • The security of Hidden Field Equations (HFE)
    • Cryptographers' Track Rsa Conference 2001, San Francisco 8-12 April 2001, Springer, April
    • Nicolas Courtois: The security of Hidden Field Equations (HFE), Cryptographers' Track Rsa Conference 2001, San Francisco 8-12 April 2001, LNCS 2020, Springer, pp. 266-281, April 2001.
    • (2001) LNCS , vol.2020 , pp. 266-281
    • Courtois, N.1
  • 13
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
    • Asiacrypt 2002, Springer, a preprint with a different version of the attack is
    • Nicolas Courtois and Josef Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Asiacrypt 2002, LNCS 2501, Springer, a preprint with a different version of the attack is available at http://eprint.iacr.org/2002/044/.
    • LNCS , vol.2501
    • Courtois, N.1    Pieprzyk, J.2
  • 14
    • 0023346708 scopus 로고
    • On the Equivalence between Berlekamp's and Euclid's Algorithms
    • May
    • Jean-Louis Dornstetter: On the Equivalence Between Berlekamp's and Euclid's Algorithms. IEEE Trans. on Information Theory. IT-33(3): 428-431. May 1987.
    • (1987) IEEE Trans. on Information Theory , vol.IT-33 , Issue.3 , pp. 428-431
    • Dornstetter, J.-L.1
  • 15
    • 23044522041 scopus 로고    scopus 로고
    • Decimation Attack of Stream Ciphers
    • Indocrypt 2000
    • Eric Filiol: Decimation Attack of Stream Ciphers, Indocrypt 2000, LNCS 1977, pp. 31-42, 2000. Available on eprint.iacr.org/2000/040.
    • (2000) LNCS , vol.1977 , pp. 31-42
    • Filiol, E.1
  • 16
    • 84958983180 scopus 로고    scopus 로고
    • On the Security of Nonlinear Filter Generators
    • FSE'96, Springer
    • Jovan Dj. Golic: On the Security of Nonlinear Filter Generators, FSE'96, LNCS 1039, pp. 173-188, Springer, 1996.
    • (1996) LNCS , vol.1039 , pp. 173-188
    • Golic, J.Dj.1
  • 17
    • 84947279371 scopus 로고    scopus 로고
    • Linear Cryptanalysis of Bluetooth Stream Cipher
    • Eurocrypt 2002, Springer
    • Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari: Linear Cryptanalysis of Bluetooth Stream Cipher, Eurocrypt 2002, LNCS 2332, pp. 238-255, Springer, 2002.
    • (2002) LNCS , vol.2332 , pp. 238-255
    • Golic, J.Dj.1    Bagini, V.2    Morgari, G.3
  • 19
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • J. L. Massey: Shift-register synthesis and BCH decoding, IEEE Trans. Information Theory, IT-15 (1969), 122-127.
    • (1969) IEEE Trans. Information Theory , vol.IT-15 , pp. 122-127
    • Massey, J.L.1
  • 20
    • 0024860262 scopus 로고
    • East correlation attacks on certain stream ciphers
    • Willi Meier and Othmar Staffelbach: East correlation attacks on certain stream ciphers, Journal of Cryptology, 1(3):159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 22
    • 0036458332 scopus 로고    scopus 로고
    • Cryptanalysis of Toyocrypt-HS1 stream cipher
    • Jan.
    • M. Mihaljevic, H. Imai: Cryptanalysis of Toyocrypt-HS1 stream cipher, IEICE Transactions on Fundamentals, vol. E85-A, pp. 66-73, Jan. 2002. Available at http://www.csl.sony.co.jp/ATL/papers/IEICEjan02.pdf.
    • (2002) IEICE Transactions on Fundamentals , vol.E85-A , pp. 66-73
    • Mihaljevic, M.1    Imai, H.2
  • 23
    • 84957640013 scopus 로고
    • Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88
    • Crypto'95, Springer
    • Jacques Patarin: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88, Crypto'95, Springer, LNCS 963, pp. 248-261, 1995.
    • (1995) LNCS , vol.963 , pp. 248-261
    • Patarin, J.1
  • 25
    • 77649327985 scopus 로고    scopus 로고
    • Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
    • Eurocrypt'2000, Springer
    • Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt'2000, LNCS 1807, pp. 392-407, Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 392-407
    • Shamir, A.1    Patarin, J.2    Courtois, N.3    Klimov, A.4
  • 26
    • 84949212529 scopus 로고    scopus 로고
    • LILI Keystream Generator
    • SAC'2000, Springer
    • L. Simpson, E. Dawson, J. Golic and W. Millan: LILI Keystream Generator, SAC'2000, LNCS 2012, pp. 248-261, Springer, 2000. See www.isrc.qut.edu.au/lili/.
    • (2000) LNCS , vol.2012 , pp. 248-261
    • Simpson, L.1    Dawson, E.2    Golic, J.3    Millan, W.4
  • 27
    • 84949427555 scopus 로고    scopus 로고
    • A Time-Memory Tradeoff Attack Against LILI-128
    • FSE 2002, Springer
    • Markku-Juhani Olavi Saarinen: A Time-Memory Tradeoff Attack Against LILI-128, FSE 2002, LNCS 2365, pp. 231-236, Springer, 2002, available at http://eprint.iacr.org/2001/077/.
    • (2002) LNCS , vol.2365 , pp. 231-236
    • Saarinen, M.-J.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.