메뉴 건너뛰기




Volumn 2139 LNCS, Issue , 2001, Pages 440-457

Correlation analysis of the shrinking generator

Author keywords

Fast correlation attacks; Posterior probabilities; Stream ciphers; Unconstrained irregular clocking

Indexed keywords

CRYPTOGRAPHY; ITERATIVE DECODING; SHIFT REGISTERS; ITERATIVE METHODS; SHRINKAGE;

EID: 84880855404     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44647-8_26     Document Type: Conference Paper
Times cited : (38)

References (17)
  • 2
    • 85028746172 scopus 로고
    • Resynchronization weakness in synchronous stream ciphers
    • Lecture Notes in Computer Science
    • J. Daemen, R. Govaerts, and J. Vandewalle, "Resynchronization weakness in synchronous stream ciphers," Advances in Cryptology - EUROCRYPT '93, Lecture Notes in Computer Science, vol. 765, pp. 159-167, 1994.
    • (1994) Advances in Cryptology - EUROCRYPT '93 , vol.765 , pp. 159-167
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 3
    • 84955594784 scopus 로고
    • Intrinsic statistical weakness of keystream generators
    • Lecture Notes in Computer Science
    • J. Dj. Golić, "Intrinsic statistical weakness of keystream generators," Advances in Cryptology - ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, pp. 91-103, 1995.
    • (1995) Advances in Cryptology - ASIACRYPT '94 , vol.917 , pp. 91-103
    • Golić, J.D.J.1
  • 4
    • 84948975118 scopus 로고
    • Embedding and probabilistic correlation attacks on clock-controlled shift registers
    • Lecture Notes in Computer Science
    • J. Dj. Golić and L. O'Connor, "Embedding and probabilistic correlation attacks on clock-controlled shift registers," Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, pp. 230-243, 1995.
    • (1995) Advances in Cryptology - EUROCRYPT '94 , vol.950 , pp. 230-243
    • Golić, J.D.J.1    O'Connor, L.2
  • 5
    • 84957682296 scopus 로고
    • Towards fast correlation attacks on irregularly clocked shift registers
    • Lecture Notes in Computer Science
    • J. Dj. Golić, "Towards fast correlation attacks on irregularly clocked shift registers," Advances in Cryptology - EUROCRYPT '95, Lecture Notes in Computer Science, vol. 921, pp. 248-262, 1995.
    • (1995) Advances in Cryptology - EUROCRYPT '95 , vol.921 , pp. 248-262
    • Golić, J.D.J.1
  • 6
    • 0008796130 scopus 로고    scopus 로고
    • Edit probability correlation attack on the alternating step generator
    • Discrete Mathematics and Theoretical Computer Science, C. Ding, T. Helleseth, and H. Niederreiter eds., Springer-Verlag
    • J. Dj. Golić and R. Menicocci, "Edit probability correlation attack on the alternating step generator," Sequences and their Applications - SETA '98, Discrete Mathematics and Theoretical Computer Science, C. Ding, T. Helleseth, and H. Niederreiter eds., Springer-Verlag, pp. 213-227, 1999.
    • (1999) Sequences and their Applications - SETA '98 , pp. 213-227
    • Golić, J.D.J.1    Menicocci, R.2
  • 7
    • 0033193646 scopus 로고    scopus 로고
    • Iterative probabilistic decoding and parity checks with memory
    • Sept.
    • J. Dj. Golić, "Iterative probabilistic decoding and parity checks with memory," Electronics Letters, vol. 35(20), pp. 1721-1723, Sept. 1999.
    • (1999) Electronics Letters , vol.35 , Issue.20 , pp. 1721-1723
    • Golić, J.D.J.1
  • 8
    • 0001120657 scopus 로고    scopus 로고
    • Fast correlation attacks on the summation generator
    • J. Dj. Golić, M. Salmasizadeh, and E. Dawson, "Fast correlation attacks on the summation generator," Journal of Cryptology, vol. 13, pp. 245-262, 2000.
    • (2000) Journal of Cryptology , vol.13 , pp. 245-262
    • Golić, J.D.J.1    Salmasizadeh, M.2    Dawson, E.3
  • 9
    • 84947776392 scopus 로고    scopus 로고
    • Reduced complexity correlation attacks on two clock-controlled generators
    • Lecture Notes in Computer Science
    • T. Johansson, "Reduced complexity correlation attacks on two clock-controlled generators," Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science, vol. 1514, pp. 342-357, 1998.
    • (1998) Advances in Cryptology - ASIACRYPT '98 , vol.1514 , pp. 342-357
    • Johansson, T.1
  • 10
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attacks on stream ciphers via convolutional codes
    • Lecture Notes in Computer Science
    • T. Johansson and F. Jonnson, "Improved fast correlation attacks on stream ciphers via convolutional codes," Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science, vol. 1592, pp. 347-362, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT '99 , vol.1592 , pp. 347-362
    • Johansson, T.1    Jonnson, F.2
  • 11
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," Journal of Cryptology, vol. 1, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 12
    • 84974658205 scopus 로고
    • A comparison of cryptanalytic principles based on iterative error-correction
    • Lecture Notes in Computer Science
    • M. J. Mihaljević and J. Dj. Golić, "A comparison of cryptanalytic principles based on iterative error-correction," Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 527-531, 1991.
    • (1991) Advances in Cryptology - EUROCRYPT '91 , vol.547 , pp. 527-531
    • Mihaljević, M.J.1    Golić, J.D.J.2
  • 13
    • 33745992035 scopus 로고
    • Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
    • Lecture Notes in Computer Science
    • M. J. Mihaljević and J. Dj. Golić, "Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 124-137, 1993.
    • (1993) Advances in Cryptology - EUROCRYPT '92 , vol.658 , pp. 124-137
    • Mihaljević, M.J.1    Golić, J.D.J.2
  • 14
    • 84974727960 scopus 로고    scopus 로고
    • A low-complexity and highperformance algorithm for the fast correlation attack
    • Lecture Notes in Computer Science
    • M. J. Mihaljević, M. P. C. Fossorier, and H. Imai, "A low-complexity and highperformance algorithm for the fast correlation attack," Fast Software Encryption - New York 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, 2001.
    • (2001) Fast Software Encryption - New York 2000 , vol.1978 , pp. 196-212
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 15
    • 84956857565 scopus 로고    scopus 로고
    • A probabilistic correlation attack on the shrinking generator
    • Lecture Notes in Computer Science
    • L. Simpson, J. Dj. Golić, and E. Dawson, "A probabilistic correlation attack on the shrinking generator," Information Security and Privacy - Brisbane '98, Lecture Notes in Computer Science, vol. 1438, pp. 147-158, 1998.
    • (1998) Information Security and Privacy - Brisbane '98 , vol.1438 , pp. 147-158
    • Simpson, L.1    Golić, J.D.J.2    Dawson, E.3
  • 17
    • 0346602660 scopus 로고
    • On the linear consistency test (LCT) in cryptanalysis with applications
    • Lecture Notes in Computer Science
    • K. Zeng, C. H. Yang, and T. R. N. Rao, "On the linear consistency test (LCT) in cryptanalysis with applications," Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science, vol. 435, pp. 164-174, 1990.
    • (1990) Advances in Cryptology - CRYPTO '89 , vol.435 , pp. 164-174
    • Zeng, K.1    Yang, C.H.2    Rao, T.R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.