-
1
-
-
84974670663
-
The shrinking generator
-
Lecture Notes in Computer Science
-
D. Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator," Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science, vol. 773, pp. 22-39, 1993.
-
(1993)
Advances in Cryptology - CRYPTO '93
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
2
-
-
85028746172
-
Resynchronization weakness in synchronous stream ciphers
-
Lecture Notes in Computer Science
-
J. Daemen, R. Govaerts, and J. Vandewalle, "Resynchronization weakness in synchronous stream ciphers," Advances in Cryptology - EUROCRYPT '93, Lecture Notes in Computer Science, vol. 765, pp. 159-167, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT '93
, vol.765
, pp. 159-167
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
3
-
-
84955594784
-
Intrinsic statistical weakness of keystream generators
-
Lecture Notes in Computer Science
-
J. Dj. Golić, "Intrinsic statistical weakness of keystream generators," Advances in Cryptology - ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, pp. 91-103, 1995.
-
(1995)
Advances in Cryptology - ASIACRYPT '94
, vol.917
, pp. 91-103
-
-
Golić, J.D.J.1
-
4
-
-
84948975118
-
Embedding and probabilistic correlation attacks on clock-controlled shift registers
-
Lecture Notes in Computer Science
-
J. Dj. Golić and L. O'Connor, "Embedding and probabilistic correlation attacks on clock-controlled shift registers," Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, pp. 230-243, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT '94
, vol.950
, pp. 230-243
-
-
Golić, J.D.J.1
O'Connor, L.2
-
5
-
-
84957682296
-
Towards fast correlation attacks on irregularly clocked shift registers
-
Lecture Notes in Computer Science
-
J. Dj. Golić, "Towards fast correlation attacks on irregularly clocked shift registers," Advances in Cryptology - EUROCRYPT '95, Lecture Notes in Computer Science, vol. 921, pp. 248-262, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT '95
, vol.921
, pp. 248-262
-
-
Golić, J.D.J.1
-
6
-
-
0008796130
-
Edit probability correlation attack on the alternating step generator
-
Discrete Mathematics and Theoretical Computer Science, C. Ding, T. Helleseth, and H. Niederreiter eds., Springer-Verlag
-
J. Dj. Golić and R. Menicocci, "Edit probability correlation attack on the alternating step generator," Sequences and their Applications - SETA '98, Discrete Mathematics and Theoretical Computer Science, C. Ding, T. Helleseth, and H. Niederreiter eds., Springer-Verlag, pp. 213-227, 1999.
-
(1999)
Sequences and their Applications - SETA '98
, pp. 213-227
-
-
Golić, J.D.J.1
Menicocci, R.2
-
7
-
-
0033193646
-
Iterative probabilistic decoding and parity checks with memory
-
Sept.
-
J. Dj. Golić, "Iterative probabilistic decoding and parity checks with memory," Electronics Letters, vol. 35(20), pp. 1721-1723, Sept. 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.20
, pp. 1721-1723
-
-
Golić, J.D.J.1
-
8
-
-
0001120657
-
Fast correlation attacks on the summation generator
-
J. Dj. Golić, M. Salmasizadeh, and E. Dawson, "Fast correlation attacks on the summation generator," Journal of Cryptology, vol. 13, pp. 245-262, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 245-262
-
-
Golić, J.D.J.1
Salmasizadeh, M.2
Dawson, E.3
-
9
-
-
84947776392
-
Reduced complexity correlation attacks on two clock-controlled generators
-
Lecture Notes in Computer Science
-
T. Johansson, "Reduced complexity correlation attacks on two clock-controlled generators," Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science, vol. 1514, pp. 342-357, 1998.
-
(1998)
Advances in Cryptology - ASIACRYPT '98
, vol.1514
, pp. 342-357
-
-
Johansson, T.1
-
10
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
Lecture Notes in Computer Science
-
T. Johansson and F. Jonnson, "Improved fast correlation attacks on stream ciphers via convolutional codes," Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science, vol. 1592, pp. 347-362, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT '99
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jonnson, F.2
-
11
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," Journal of Cryptology, vol. 1, pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
12
-
-
84974658205
-
A comparison of cryptanalytic principles based on iterative error-correction
-
Lecture Notes in Computer Science
-
M. J. Mihaljević and J. Dj. Golić, "A comparison of cryptanalytic principles based on iterative error-correction," Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 527-531, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT '91
, vol.547
, pp. 527-531
-
-
Mihaljević, M.J.1
Golić, J.D.J.2
-
13
-
-
33745992035
-
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
-
Lecture Notes in Computer Science
-
M. J. Mihaljević and J. Dj. Golić, "Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 124-137, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT '92
, vol.658
, pp. 124-137
-
-
Mihaljević, M.J.1
Golić, J.D.J.2
-
14
-
-
84974727960
-
A low-complexity and highperformance algorithm for the fast correlation attack
-
Lecture Notes in Computer Science
-
M. J. Mihaljević, M. P. C. Fossorier, and H. Imai, "A low-complexity and highperformance algorithm for the fast correlation attack," Fast Software Encryption - New York 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, 2001.
-
(2001)
Fast Software Encryption - New York 2000
, vol.1978
, pp. 196-212
-
-
Mihaljević, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
15
-
-
84956857565
-
A probabilistic correlation attack on the shrinking generator
-
Lecture Notes in Computer Science
-
L. Simpson, J. Dj. Golić, and E. Dawson, "A probabilistic correlation attack on the shrinking generator," Information Security and Privacy - Brisbane '98, Lecture Notes in Computer Science, vol. 1438, pp. 147-158, 1998.
-
(1998)
Information Security and Privacy - Brisbane '98
, vol.1438
, pp. 147-158
-
-
Simpson, L.1
Golić, J.D.J.2
Dawson, E.3
-
16
-
-
0033617060
-
A fast correlation attack on multiplexer generators
-
L. Simpson, J. Dj. Golić, M. Salmasizadeh, and E. Dawson, "A fast correlation attack on multiplexer generators," Information Processing Letters, vol. 70, pp. 89-93, 1999.
-
(1999)
Information Processing Letters
, vol.70
, pp. 89-93
-
-
Simpson, L.1
Golić, J.D.J.2
Salmasizadeh, M.3
Dawson, E.4
-
17
-
-
0346602660
-
On the linear consistency test (LCT) in cryptanalysis with applications
-
Lecture Notes in Computer Science
-
K. Zeng, C. H. Yang, and T. R. N. Rao, "On the linear consistency test (LCT) in cryptanalysis with applications," Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science, vol. 435, pp. 164-174, 1990.
-
(1990)
Advances in Cryptology - CRYPTO '89
, vol.435
, pp. 164-174
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.N.3
|