-
1
-
-
35248840147
-
Algebraic Attacks on Combiners with Memory
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Armknecht, F., Krause, M.: Algebraic Attacks on Combiners with Memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 162-175. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
2
-
-
84948963512
-
-
Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks using parity-check equations of weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, 1807, pp. 573-588. Springer, Heidelberg (2000)
-
Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks using parity-check equations of weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 573-588. Springer, Heidelberg (2000)
-
-
-
-
3
-
-
84969367308
-
-
Chepyzhov, V.V., Johansson, T., Smeets, B.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 181-195. Springer, Heidelberg (2001)
-
Chepyzhov, V.V., Johansson, T., Smeets, B.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 181-195. Springer, Heidelberg (2001)
-
-
-
-
4
-
-
84888039254
-
Fast Correlation Attacks: An Algorithmic Point of View
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Chose, P., Joux, A., Mitton, M.: Fast Correlation Attacks: An Algorithmic Point of View. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 209-221. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 209-221
-
-
Chose, P.1
Joux, A.2
Mitton, M.3
-
5
-
-
38348999607
-
-
Clark, A., Dawson, E., Fuller, J., Golić, J., et al.: The LILI-128 Keystream Generator. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, 2012, pp. 22-39. Springer, Heidelberg (2001)
-
Clark, A., Dawson, E., Fuller, J., Golić, J., et al.: The LILI-128 Keystream Generator. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 22-39. Springer, Heidelberg (2001)
-
-
-
-
6
-
-
35248820612
-
Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Biham, E, ed, Advances in Cryptology, EUROCRPYT 2003, Springer, Heidelberg
-
Courtois, N.T., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) Advances in Cryptology - EUROCRPYT 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.T.1
Meier, W.2
-
7
-
-
35248849880
-
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Courtois, N.T.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176-194. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 176-194
-
-
Courtois, N.T.1
-
8
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
Golić, J.D.: Computation of low-weight parity-check polynomials. Electronic Letters 32(21), 1981-1982 (1996)
-
(1996)
Electronic Letters
, vol.32
, Issue.21
, pp. 1981-1982
-
-
Golić, J.D.1
-
9
-
-
0001120657
-
-
Golić, J.D, Salmasizadeh, M, ed, Springer-Verlag
-
Golić, J.D., Salmasizadeh, M. (ed.): Dawson, Fast correlation attacks on the summation generator, Journal of Cryptology, Springer-Verlag, vol. 13, pp. 245-262 (2000)
-
(2000)
Dawson, Fast correlation attacks on the summation generator, Journal of Cryptology
, vol.13
, pp. 245-262
-
-
-
10
-
-
0035504687
-
Iterative optimum symbol-by-symbol decoding and fast correlation attack
-
Golić, J.D.: Iterative optimum symbol-by-symbol decoding and fast correlation attack. IEEE Trans. Inform. Theory 47, 3040-3049 (2001)
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 3040-3049
-
-
Golić, J.D.1
-
11
-
-
14844341544
-
Vetorial appraoch to fast correlation attacks
-
Golić, J.D., Hawkes, P.: Vetorial appraoch to fast correlation attacks. Designs, Codes and Cryptography 35, 5-19 (2005)
-
(2005)
Designs, Codes and Cryptography
, vol.35
, pp. 5-19
-
-
Golić, J.D.1
Hawkes, P.2
-
12
-
-
84947279371
-
Linear cryptanalysis of bluetooth stream cipher
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Golić, J.D.: Linear cryptanalysis of bluetooth stream cipher. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 238-255, pp. 51-74. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
-
-
Golić, J.D.1
-
14
-
-
84957062097
-
Fast Correlation Attacks based on turbo code techniques
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Johansson, T., Jösson, F.: Fast Correlation Attacks based on turbo code techniques. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 181-197. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jösson, F.2
-
15
-
-
84947776392
-
Reduced complexity correlation attacks on two clock-controlled generators
-
Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
-
Johansson, T.: Reduced complexity correlation attacks on two clock-controlled generators. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 342-357. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 342-357
-
-
Johansson, T.1
-
16
-
-
84957702423
-
Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Johansson, T., Jösson, F.: Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 347-362. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jösson, F.2
-
17
-
-
84974625340
-
Fast Correlation Attacks through reconstruction of linear polynomals
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Johansson, T., Jösson, F.: Fast Correlation Attacks through reconstruction of linear polynomals. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 300-315. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jösson, F.2
-
19
-
-
35048894912
-
Faster Correlation Attack on Bluetooth Keystream Generator E0
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Lu, Y., Vaudenay, S.: Faster Correlation Attack on Bluetooth Keystream Generator E0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 407-425. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 407-425
-
-
Lu, Y.1
Vaudenay, S.2
-
20
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
21
-
-
0024860262
-
Fast Correlation Attacks on certain stream ciphers
-
Meier, W., Staffelbach, O.: Fast Correlation Attacks on certain stream ciphers. Journal of Cryptology 159-176 (1989)
-
(1989)
Journal of Cryptology
, vol.159-176
-
-
Meier, W.1
Staffelbach, O.2
-
22
-
-
84944878354
-
-
CRC, Boca Raton
-
Menezes, A.J., Van Orschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Orschot, P.C.2
Vanstone, S.A.3
-
23
-
-
84974727960
-
-
Mihaljević, M., Fossorier, M.P.C., Imai, H.: A Low-complexity and High-performance Algorithm for Fast Correlation Attack. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 196-212. Springer, Heidelberg (2001)
-
Mihaljević, M., Fossorier, M.P.C., Imai, H.: A Low-complexity and High-performance Algorithm for Fast Correlation Attack. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 196-212. Springer, Heidelberg (2001)
-
-
-
-
24
-
-
38349069235
-
-
Mihaljević, M., Fossorier, M.P.C., Imai, H.: Fast Correlation Attack Algorithm with listing decoding and an application. In: Matsui, M. (ed.) FSE 2001. LNCS, 2355, pp. 208-222. Springer, Heidelberg (2002)
-
Mihaljević, M., Fossorier, M.P.C., Imai, H.: Fast Correlation Attack Algorithm with listing decoding and an application. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 208-222. Springer, Heidelberg (2002)
-
-
-
-
25
-
-
26444613218
-
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Molland, H., Helleseth, T.: An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 373-389. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 373-389
-
-
Molland, H.1
Helleseth, T.2
-
26
-
-
0021786321
-
Decrypting a Class of Stream Ciphers using ciphertext only
-
Siegenthaler, T.: Decrypting a Class of Stream Ciphers using ciphertext only. IEEE Transactions on Computer C-34, 81-85 (1985)
-
(1985)
IEEE Transactions on Computer
, vol.C-34
, pp. 81-85
-
-
Siegenthaler, T.1
-
27
-
-
84937428040
-
A Generalized Birthday Problem
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-304. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 288-304
-
-
Wagner, D.1
-
29
-
-
24144475860
-
-
Zhang, B., Wu, H., Feng, D., Bao, F.: A Fast Correlation attack on the shrinking generator. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 72-86. Springer, Heidelberg (2005)
-
Zhang, B., Wu, H., Feng, D., Bao, F.: A Fast Correlation attack on the shrinking generator. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 72-86. Springer, Heidelberg (2005)
-
-
-
|