-
1
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
B. Preneel (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Canteaut, A. and Trabbia, M. (2000) ‘Improved fast correlation attacks using parity-check equations of weight 4 and 5’, in B. Preneel (Ed). Advances in Cryptology – EUROCRYPT 2000, Vol. 1807, Lecture Notes in Computer Science, Springer-Verlag, pp.573–588.
-
(2000)
Advances in Cryptology – EUROCRYPT 2000
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
2
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
B. Schneier (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Chepyzhov, V., Johansson, T. and Smeets, B. (2000) ‘A simple algorithm for fast correlation attacks on stream ciphers’, in B. Schneier (Ed). Fast Software Encryption 2000, Vol. 1978, Lecture Notes in Computer Science, Springer-Verlag, pp.181–195.
-
(2000)
Fast Software Encryption 2000
, vol.1978
, pp. 181-195
-
-
Chepyzhov, V.1
Johansson, T.2
Smeets, B.3
-
3
-
-
84937397479
-
Cryptanalysis of stream ciphers with linear masking
-
M. Yung (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Coppersmith, D., Halevi, S. and Jutla, C. (2002) ‘Cryptanalysis of stream ciphers with linear masking’, in M. Yung (Ed). Advances in Cryptology – CRYPTO 2002, Vol. 2442, Lecture Notes in Computer Science, Springer-Verlag, pp.515–532.
-
(2002)
Advances in Cryptology – CRYPTO 2002
, vol.2442
, pp. 515-532
-
-
Coppersmith, D.1
Halevi, S.2
Jutla, C.3
-
4
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
D. Boneh (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Courtois, N. (2003) ‘Fast algebraic attacks on stream ciphers with linear feedback’, in D. Boneh (Ed). Advances in Cryptology – CRYPTO 2003, Vol. 2729, Lecture Notes in Computer Science, Springer-Verlag, pp.176–194.
-
(2003)
Advances in Cryptology – CRYPTO 2003
, vol.2729
, pp. 176-194
-
-
Courtois, N.1
-
5
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
E. Biham (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Courtois, N. and Meier, W. (2003) ‘Algebraic attacks on stream ciphers with linear feedback’, in E. Biham (Ed). Advances in Cryptology – EUROCRYPT 2003, Vol. 2656, Lecture Notes in Computer Science, Springer-Verlag, pp.345–359.
-
(2003)
Advances in Cryptology – EUROCRYPT 2003
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
8
-
-
84949479756
-
Distinguishing attacks on SOBER-t16 and SOBER-t32
-
J. Daemen and V. Rijmen (Eds) Lecture Notes in Computer Science, Springer-Verlag
-
Ekdahl, P. and Johansson, T. (2002) ‘Distinguishing attacks on SOBER-t16 and SOBER-t32’, in J. Daemen and V. Rijmen (Eds). Fast Software Encryption 2002, Vol. 2365, Lecture Notes in Computer Science, Springer-Verlag, pp.210–224.
-
(2002)
Fast Software Encryption 2002
, vol.2365
, pp. 210-224
-
-
Ekdahl, P.1
Johansson, T.2
-
9
-
-
26444575925
-
A new distinguisher for clock controlled stream ciphers
-
Fast Software Encryption 2005, Springer-Verlag
-
Englund, H. and Johansson, T. (2005a) ‘A new distinguisher for clock controlled stream ciphers’, Fast Software Encryption 2005, Lecture Notes in Computer Science, Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
-
-
Englund, H.1
Johansson, T.2
-
10
-
-
24144456208
-
A new simple technique to attack filter generators and related ciphers
-
H. Handschuh and A. Hasan (Eds) Lecture Notes in Computer Science, Springer-Verlag
-
Englund, H. and Johansson, T. (2005b) ‘A new simple technique to attack filter generators and related ciphers’, in H. Handschuh and A. Hasan (Eds). Selected Areas in Cryptography – SAC 2004, Vol. 3357, Lecture Notes in Computer Science, Springer-Verlag, pp.39–53.
-
(2005)
Selected Areas in Cryptography – SAC 2004
, vol.3357
, pp. 39-53
-
-
Englund, H.1
Johansson, T.2
-
11
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
Golić, J. (1996) ‘Computation of low-weight parity-check polynomials’, Electronic Letters, Vol. 32, No. 21, pp.1981–1982.
-
(1996)
Electronic Letters
, vol.32
, Issue.21
, pp. 1981-1982
-
-
Golić, J.1
-
13
-
-
84957062097
-
Fast correlation attacks based on turbo code techniques
-
M.Wiener (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Johansson, T. and Jönsson, F. (1999a) ‘Fast correlation attacks based on turbo code techniques’, in M.Wiener (Ed). Advances in Cryptology – CRYPTO’99, Vol. 1666, Lecture Notes in Computer Science, Springer-Verlag, pp.181–197.
-
(1999)
Advances in Cryptology – CRYPTO’99
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
14
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
J. Stern (Ed) Lecture Notes in Computer Science Springer-Verlag
-
Johansson, T. and Jönsson, F. (1999b) ‘Improved fast correlation attacks on stream ciphers via convolutional codes’, in J. Stern (Ed). Advances in Cryptology – EUROCRYPT’99, Vol. 1592, Lecture Notes in Computer Science, Springer-Verlag, pp.347–362.
-
(1999)
Advances in Cryptology – EUROCRYPT’99
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jönsson, F.2
-
15
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials
-
M. Bellare (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Johansson, T. and Jönsson, F. (2000) ‘Fast correlation attacks through reconstruction of linear polynomials’, in M. Bellare (Ed). Advances in Cryptology – CRYPTO 2000, Vol. 1880, Lecture Notes in Computer Science, Springer-Verlag, pp.300–315.
-
(2000)
Advances in Cryptology – CRYPTO 2000
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jönsson, F.2
-
17
-
-
35248813838
-
On the optimality of linear, differential and sequential distinguishers
-
Lecture Notes in Computer Science, Springer-Verlag
-
Junod, P. (2003) ‘On the optimality of linear, differential and sequential distinguishers’, Advances in Cryptology – EUROCRYPT 2003, Vol. 2656, Lecture Notes in Computer Science, Springer-Verlag, pp.17–32.
-
(2003)
Advances in Cryptology – EUROCRYPT 2003
, vol.2656
, pp. 17-32
-
-
Junod, P.1
-
18
-
-
33646803496
-
Fast computation of large distributions and its cryptographic applications
-
Lecture Notes in Computer Science, Springer-Verlag
-
Maximov, A. and Johansson, T. (2005) ‘Fast computation of large distributions and its cryptographic applications’, Advances in Cryptology – ASIACRYPT 2005, Vol. 3788, Lecture Notes in Computer Science, Springer-Verlag, pp.313–332.
-
(2005)
Advances in Cryptology – ASIACRYPT 2005
, vol.3788
, pp. 313-332
-
-
Maximov, A.1
Johansson, T.2
-
19
-
-
33745650569
-
Fast correlation attacks on stream ciphers
-
C. Günter (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Meier, W. and Staffelbach, O. (1988) ‘Fast correlation attacks on stream ciphers’, in C. Günter (Ed). Advances in Cryptology – EUROCRYPT’88, Vol. 330, Lecture Notes in Computer Science, Springer-Verlag, pp.301–316.
-
(1988)
Advances in Cryptology – EUROCRYPT’88
, vol.330
, pp. 301-316
-
-
Meier, W.1
Staffelbach, O.2
-
20
-
-
0021489155
-
Correlation-immunity of non-linear combining functions for cryptographic applications
-
Siegenthaler, T. (1984) ‘Correlation-immunity of non-linear combining functions for cryptographic applications’, IEEE Transactions on Information Theory, Vol. 30, pp.776–780.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, pp. 776-780
-
-
Siegenthaler, T.1
-
21
-
-
84937428040
-
A generalized birthday problem
-
M. Yung (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Wagner, D. (2002) ‘A generalized birthday problem’, in M. Yung (Ed). Advances in Cryptology – CRYPTO 2002, Vol. 2442, Lecture Notes in Computer Science, Springer-Verlag, pp.288–303.
-
(2002)
Advances in Cryptology – CRYPTO 2002
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
-
22
-
-
33746729581
-
A distinguishing attack of SNOW 2.0 with linear masking method
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Watanabe, D., Biryukov, A. and Canniere, C.D. (2003) ‘A distinguishing attack of SNOW 2.0 with linear masking method’, in Selected Areas in Cryptography—SAC 2003, Vol. 3006 of Lecture Notes in Computer Science, Springer-Verlag, pp.222–233.
-
(2003)
Selected Areas in Cryptography—SAC 2003
, vol.3006
, pp. 222-233
-
-
Watanabe, D.1
Biryukov, A.2
Canniere, C.D.3
|