-
2
-
-
85030473541
-
On a fast correlation attack on stream ciphers
-
V. Chepyzhov and B. Smeets, “On a fast correlation attack on stream ciphers,” Advances in Cryptology - EUROCRYPT ’91, Lecture Notes in Computer Science, vol. 547, pp. 176-185, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT ’91
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
3
-
-
0011043342
-
Divide andconquer attacks on certain classes of stream ciphers
-
E. Dawson and A. Clark, “Divide andconquer attacks on certain classes of stream ciphers,” Cryptologia, vol. 18, pp. 25-40, 1994.
-
(1994)
Cryptologia
, vol.18
, pp. 25-40
-
-
Dawson, E.1
Clark, A.2
-
4
-
-
84949226395
-
Analysis of the
-
S. Fluhrer and S. Lucks, “Analysis of the E0 encryption system,” SelectedAreas in Cryptography - SAC 2001, Lecture Notes in Computer Science, vol. 2259, pp. 38-48, 2001.
-
(2001)
Selectedareas in Cryptography - SAC 2001, Lecture Notes in Computer Science
, vol.2259
, pp. 38-48
-
-
Fluhrer, S.1
Lucks, S.2
-
5
-
-
0032647173
-
“Reducedcomplexit y iterative decoding of low-density parity check codes based on belief propagation
-
May
-
M. P. C. Fossorier, M. J. Mihaljevic, andH. Imai, “Reducedcomplexit y iterative decoding of low-density parity check codes based on belief propagation,” IEEE Trans. Commun., vol. 47, pp. 673-680, May 1999.
-
(1999)
IEEE Trans. Commun
, vol.47
, pp. 673-680
-
-
Fossorier, M.1
Mihaljevic, M.J.2
Imai, H.3
-
6
-
-
84925405668
-
Low-density parity-check codes
-
Jan
-
R. G. Gallager, “Low-density parity-check codes,” IRE Trans. Inform. Theory, vol. 8, pp. 21-28, Jan. 1962.
-
(1962)
IRE Trans. Inform. Theory
, vol.8
, pp. 21-28
-
-
Gallager, R.G.1
-
7
-
-
0242549872
-
Correlation properties of a general binary combiner with memory
-
J. Dj. Golic, “Correlation properties of a general binary combiner with memory,” Journal of Cryptology, vol. 9, pp. 111-126, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, pp. 111-126
-
-
Golic, J.D.1
-
8
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
J. Dj. Golic, “Computation of low-weight parity-check polynomials,” Electronics Letters, vol. 32, pp. 1981-1982, Oct. 1996.
-
(1996)
Electronics Letters
, vol.32
, pp. 1981-1982
-
-
Golic, J.D.1
-
9
-
-
84957381006
-
Cryptanalysis of allegedA5 stream cipher
-
J. Dj. Golic, “Cryptanalysis of allegedA5 stream cipher,” Advances in Cryptology - EUROCRYPT ’97, Lecture Notes in Computer Science, vol. 1233, pp. 239-255, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT ’97, Lecture Notes in Computer Science
, vol.1233
, pp. 239-255
-
-
Golic, J.D.1
-
10
-
-
0001120657
-
Fast correlation attacks on the summation generator
-
J. Dj. Golic, M. Salmasizadeh, and E. Dawson, “Fast correlation attacks on the summation generator,” Journal of Cryptology, vol. 13, pp. 245-262, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 245-262
-
-
Golic, J.D.1
Salmasizadeh, M.2
Dawson, E.3
-
11
-
-
0035504687
-
Iterative optimum symbol-by-symbol decoding and fast correlation attacks
-
J. Dj. Golic, “Iterative optimum symbol-by-symbol decoding and fast correlation attacks,” IEEE Trans. Inform. Theory, vol. 47, pp. 3040-3049, 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 3040-3049
-
-
Golic, J.D.1
-
12
-
-
84935078039
-
AndS. Wetzel, “Security weaknesses in Bluetooth
-
M. Jakobsson andS. Wetzel, “Security weaknesses in Bluetooth,” Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science, vol. 2020, pp. 176-191, 2001.
-
(2001)
Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
-
13
-
-
0016998516
-
An optimum symbol-by-symbol decoding rule for linear codes
-
Sept
-
C. R. P. Hartmann and L. D. Rudolph, “An optimum symbol-by-symbol decoding rule for linear codes,” IEEE Trans. Inform. Theory, vol. 22, pp. 514-517, Sept. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, pp. 514-517
-
-
Hartmann, C.1
Rudolph, L.D.2
-
14
-
-
84958740066
-
Correlation properties of the Bluetooth combiner
-
M. Hermelin and K. Nyberg, “Correlation properties of the Bluetooth combiner,” Information Security andCryptology - ICISC ’99, Lecture Notes in Computer Science, vol. 1787, pp. 17-29, 1999.
-
(1999)
Information Security Andcryptology - ICISC ’99
, vol.1787
, pp. 17-29
-
-
Hermelin, M.1
Nyberg, K.2
-
15
-
-
0033099611
-
Gooderror-correcting codes basedon very sparse matrices
-
Mar
-
D. J. C. MacKay, “Gooderror-correcting codes basedon very sparse matrices,” IEEE Trans. Inform. Theory, vol. 45, pp. 399-431, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 399-431
-
-
Mackay, D.1
-
16
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1, pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
17
-
-
0026678847
-
Correlation properties of combiners with memory in stream ciphers
-
W. Meier and O. Staffelbach, “Correlation properties of combiners with memory in stream ciphers,” Journal of Cryptology, vol. 5, pp. 67-86, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, pp. 67-86
-
-
Meier, W.1
Staffelbach, O.2
-
18
-
-
0034269942
-
A methodfor convergence analysis of iterative probabilistic decoding
-
Sept
-
M. J. Mihaljevic and J. Dj. Golic, “A methodfor convergence analysis of iterative probabilistic decoding,” IEEE Trans. Inform. Theory, vol. 46, pp. 2206-2211, Sept. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 2206-2211
-
-
Mihaljevic, M.J.1
Golic, J.D.2
|