메뉴 건너뛰기




Volumn 2332, Issue , 2002, Pages 238-255

Linear cryptanalysis of bluetooth stream cipher

Author keywords

Iterative probabilistic decoding; Linear correlations; Linear cryptanalysis; Reinitialization

Indexed keywords

BLUETOOTH; ITERATIVE DECODING; ITERATIVE METHODS;

EID: 84947279371     PISSN: 03029743     EISSN: 16113349     Source Type: Journal    
DOI: 10.1007/3-540-46035-7_16     Document Type: Article
Times cited : (43)

References (18)
  • 2
    • 85030473541 scopus 로고
    • On a fast correlation attack on stream ciphers
    • V. Chepyzhov and B. Smeets, “On a fast correlation attack on stream ciphers,” Advances in Cryptology - EUROCRYPT ’91, Lecture Notes in Computer Science, vol. 547, pp. 176-185, 1991.
    • (1991) Advances in Cryptology - EUROCRYPT ’91 , vol.547 , pp. 176-185
    • Chepyzhov, V.1    Smeets, B.2
  • 3
    • 0011043342 scopus 로고
    • Divide andconquer attacks on certain classes of stream ciphers
    • E. Dawson and A. Clark, “Divide andconquer attacks on certain classes of stream ciphers,” Cryptologia, vol. 18, pp. 25-40, 1994.
    • (1994) Cryptologia , vol.18 , pp. 25-40
    • Dawson, E.1    Clark, A.2
  • 5
    • 0032647173 scopus 로고    scopus 로고
    • “Reducedcomplexit y iterative decoding of low-density parity check codes based on belief propagation
    • May
    • M. P. C. Fossorier, M. J. Mihaljevic, andH. Imai, “Reducedcomplexit y iterative decoding of low-density parity check codes based on belief propagation,” IEEE Trans. Commun., vol. 47, pp. 673-680, May 1999.
    • (1999) IEEE Trans. Commun , vol.47 , pp. 673-680
    • Fossorier, M.1    Mihaljevic, M.J.2    Imai, H.3
  • 6
    • 84925405668 scopus 로고
    • Low-density parity-check codes
    • Jan
    • R. G. Gallager, “Low-density parity-check codes,” IRE Trans. Inform. Theory, vol. 8, pp. 21-28, Jan. 1962.
    • (1962) IRE Trans. Inform. Theory , vol.8 , pp. 21-28
    • Gallager, R.G.1
  • 7
    • 0242549872 scopus 로고    scopus 로고
    • Correlation properties of a general binary combiner with memory
    • J. Dj. Golic, “Correlation properties of a general binary combiner with memory,” Journal of Cryptology, vol. 9, pp. 111-126, 1996.
    • (1996) Journal of Cryptology , vol.9 , pp. 111-126
    • Golic, J.D.1
  • 8
    • 0030261891 scopus 로고    scopus 로고
    • Computation of low-weight parity-check polynomials
    • J. Dj. Golic, “Computation of low-weight parity-check polynomials,” Electronics Letters, vol. 32, pp. 1981-1982, Oct. 1996.
    • (1996) Electronics Letters , vol.32 , pp. 1981-1982
    • Golic, J.D.1
  • 10
    • 0001120657 scopus 로고    scopus 로고
    • Fast correlation attacks on the summation generator
    • J. Dj. Golic, M. Salmasizadeh, and E. Dawson, “Fast correlation attacks on the summation generator,” Journal of Cryptology, vol. 13, pp. 245-262, 2000.
    • (2000) Journal of Cryptology , vol.13 , pp. 245-262
    • Golic, J.D.1    Salmasizadeh, M.2    Dawson, E.3
  • 11
    • 0035504687 scopus 로고    scopus 로고
    • Iterative optimum symbol-by-symbol decoding and fast correlation attacks
    • J. Dj. Golic, “Iterative optimum symbol-by-symbol decoding and fast correlation attacks,” IEEE Trans. Inform. Theory, vol. 47, pp. 3040-3049, 2001.
    • (2001) IEEE Trans. Inform. Theory , vol.47 , pp. 3040-3049
    • Golic, J.D.1
  • 13
    • 0016998516 scopus 로고
    • An optimum symbol-by-symbol decoding rule for linear codes
    • Sept
    • C. R. P. Hartmann and L. D. Rudolph, “An optimum symbol-by-symbol decoding rule for linear codes,” IEEE Trans. Inform. Theory, vol. 22, pp. 514-517, Sept. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.22 , pp. 514-517
    • Hartmann, C.1    Rudolph, L.D.2
  • 14
    • 84958740066 scopus 로고    scopus 로고
    • Correlation properties of the Bluetooth combiner
    • M. Hermelin and K. Nyberg, “Correlation properties of the Bluetooth combiner,” Information Security andCryptology - ICISC ’99, Lecture Notes in Computer Science, vol. 1787, pp. 17-29, 1999.
    • (1999) Information Security Andcryptology - ICISC ’99 , vol.1787 , pp. 17-29
    • Hermelin, M.1    Nyberg, K.2
  • 15
    • 0033099611 scopus 로고    scopus 로고
    • Gooderror-correcting codes basedon very sparse matrices
    • Mar
    • D. J. C. MacKay, “Gooderror-correcting codes basedon very sparse matrices,” IEEE Trans. Inform. Theory, vol. 45, pp. 399-431, Mar. 1999.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 399-431
    • Mackay, D.1
  • 16
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 17
    • 0026678847 scopus 로고
    • Correlation properties of combiners with memory in stream ciphers
    • W. Meier and O. Staffelbach, “Correlation properties of combiners with memory in stream ciphers,” Journal of Cryptology, vol. 5, pp. 67-86, 1992.
    • (1992) Journal of Cryptology , vol.5 , pp. 67-86
    • Meier, W.1    Staffelbach, O.2
  • 18
    • 0034269942 scopus 로고    scopus 로고
    • A methodfor convergence analysis of iterative probabilistic decoding
    • Sept
    • M. J. Mihaljevic and J. Dj. Golic, “A methodfor convergence analysis of iterative probabilistic decoding,” IEEE Trans. Inform. Theory, vol. 46, pp. 2206-2211, Sept. 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 2206-2211
    • Mihaljevic, M.J.1    Golic, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.