메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 303-316

Exploiting multiples of the connection polynomial in word-oriented stream ciphers

Author keywords

Cryptanalysis; SOBER; SSC II; Stream ciphers; T class

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84937412475     PISSN: 03029743     EISSN: 16113349     Source Type: Journal    
DOI: 10.1007/3-540-44448-3_23     Document Type: Article
Times cited : (39)

References (16)
  • 1
    • 35248871696 scopus 로고    scopus 로고
    • Technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K
    • S. Blackburn, S. Murphy, F. Piper, and P. Wild. A SOBERing remark. Technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K., 1998.
    • (1998) A Sobering Remark
    • Blackburn, S.1    Murphy, S.2    Piper, F.3    Wild, P.4
  • 3
    • 84957630525 scopus 로고    scopus 로고
    • SOBER cryptanalysis. Fast Software Encryption
    • L. Knudsen ed., Springer- Verlag
    • D. Bleichenbacher and S Patel. SOBER cryptanalysis. Fast Software Encryption, FSE’99 Lecture Notes in Computer Science, vol. 1636, L. Knudsen ed., Springer- Verlag, pages 305-316, 1999.
    • (1999) FSE’99 Lecture Notes in Computer Science , vol.1636 , pp. 305-316
    • Bleichenbacher, D.1    Patel, S.2
  • 4
    • 85030473541 scopus 로고
    • On a fast correlation attack on certain stream ciphers. Advances in Cryptology
    • D. W. Davies ed., Springer-Verlag
    • V. Chepyzhov and B. Smeets. On a fast correlation attack on certain stream ciphers. Advances in Cryptology, EUROCRYPT’91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 176-185, 1991.
    • (1991) EUROCRYPT’91, Lecture Notes in Computer Science , vol.547 , pp. 176-185
    • Chepyzhov, V.1    Smeets, B.2
  • 5
    • 84961308145 scopus 로고    scopus 로고
    • Inversion attack and branching. Information Security and Privacy
    • ACISP’99, Lecture Notes in Computer Science,, J. Pieprzyk, R Safavi-Naini, J. Seberry eds., Springer-Verlag
    • J. Golić, A. Clark, and E. Dawson. Inversion attack and branching. Information Security and Privacy, Fourth Australasian Conference, ACISP’99, Lecture Notes in Computer Science, vol. 1587, J. Pieprzyk, R Safavi-Naini, J. Seberry eds., Springer-Verlag, pages 88-102, 1999.
    • (1999) Fourth Australasian Conference , vol.1587 , pp. 88-102
    • Golić, J.1    Clark, A.2    Dawson, E.3
  • 6
    • 84958983180 scopus 로고
    • On the security of nonlinear filter generators
    • D. Gollmann ed., Springer
    • J. Dj. Golić. On the security of nonlinear filter generators. Fast Software Encryption, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer, pages 173-188, 1995.
    • (1995) Fast Software Encryption, Lecture Notes in Computer Science , vol.1039 , pp. 173-188
    • Golić, J.D.1
  • 7
    • 84937502973 scopus 로고    scopus 로고
    • Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
    • P. Hawkes. An attack on SOBER-II. Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1999.
    • (1999) An Attack on SOBER-II
    • Hawkes, P.1
  • 8
    • 27844457796 scopus 로고    scopus 로고
    • Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
    • P. Hawkes and G. Rose. The t-class of SOBER stream ciphers. Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1999. See http://www.home.aone.net.au/qualcomm.
    • (1999) The T-Class of SOBER Stream Ciphers
    • Hawkes, P.1    Rose, G.2
  • 9
    • 85032286198 scopus 로고
    • On functions of Linear Shift Register Sequences
    • Lecture Notes in Computer Science, F. Pichler ed., Springer-Verlag
    • T. Herlestam. On functions of Linear Shift Register Sequences. Advances in Cryptology, EUROCRYPT’85, Lecture Notes in Computer Science, vol. 219, F. Pichler ed., Springer-Verlag, 1986.
    • (1986) Advances in Cryptology, EUROCRYPT’85 , vol.219
    • Herlestam, T.1
  • 10
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attacks on stream ciphers via convolutional codes
    • Lecture Notes in Computer Science, J. Sterned., Springer-Verlag
    • T. Johansson and F Jönsson. Improved fast correlation attacks on stream ciphers via convolutional codes. Advances in Cryptology, EUROCRYPT’99, Lecture Notes in Computer Science, vol. 1592, J. Sterned., Springer-Verlag, pages 347-362, 1999.
    • (1999) Advances in Cryptology, EUROCRYPT’99 , vol.1592 , pp. 347-362
    • Johansson, T.1    Jönsson, F.2
  • 12
    • 48249132171 scopus 로고    scopus 로고
    • Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
    • G. Rose. S32: A fast stream cipher based on linear feedback over GF(232). Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1998.
    • (1998) S32: A Fast Stream Cipher Based on Linear Feedback over GF(232)
    • Rose, G.1
  • 13
    • 48249132171 scopus 로고    scopus 로고
    • Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
    • G. Rose. SOBER: A stream cipher based on linear feedback over GF(28). Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1998. See http://www.home.aone.net.au/qualcomm.
    • (1998) SOBER: A Stream Cipher Based on Linear Feedback over GF(28)
    • Rose, G.1
  • 14
    • 84956864062 scopus 로고    scopus 로고
    • A stream cipher based on linear feedback over GF(28)
    • Lecture Notes in Computer Science, C. Boyd, E. Dawson eds., Springer-Verlag
    • G. Rose. A stream cipher based on linear feedback over GF(28). Information Security and Privacy, Third Australasian Conference, ACISP’98, Lecture Notes in Computer Science, vol. 1438, C. Boyd, E. Dawson eds., Springer-Verlag, pages 135-146, 1998.
    • (1998) Information Security and Privacy, Third Australasian Conference, ACISP’98 , vol.1438 , pp. 135-146
    • Rose, G.1
  • 15
    • 84937502975 scopus 로고    scopus 로고
    • Technical Report TR45.AHAG.99.02.09.15, TR45 Ad Hoc Authentication Group
    • M. Zhang, C. Carroll, and A. Chan. SSC. Technical Report TR45.AHAG.99.02.09.15, TR45 Ad Hoc Authentication Group, 1999.
    • (1999) SSC
    • Zhang, M.1    Carroll, C.2    Chan, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.