-
1
-
-
85030473541
-
On a fast correlation attack on stream ciphers
-
Lecture Notes in Computer Science, D. W. Davies ed., Springer-Verlag
-
V. Chepyzhov and B. Smeets, "On a fast correlation attack on stream ciphers," Advances in Cryptology - EUROCRYPT'91,Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 176-185, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT'91
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
2
-
-
0003407887
-
-
Springer-Verlag
-
C. Ding, G. Xiao, and W. Shan,The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science, vol. 561, Springer-Verlag, 1991.
-
(1991)
The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science
, vol.561
-
-
Ding, C.1
Xiao, G.2
Shan, W.3
-
4
-
-
84929185964
-
A fast correlation attack on nonlinearly feedforward filtered shift-register sequences
-
Lecture Notes in Computer Science, J.-J. Quisquater and J. Vandewalle eds., Springer-Verlag
-
R. Forré, "A fast correlation attack on nonlinearly feedforward filtered shift-register sequences," Advances in Cryptology - EUROCRYPT'89,Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater and J. Vandewalle eds., Springer-Verlag, pp. 586-595, 1990.
-
(1990)
Advances in Cryptology - EUROCRYPT'89
, vol.434
, pp. 586-595
-
-
Forré, R.1
-
5
-
-
84925405668
-
Low-density parity-check codes
-
Jan
-
R. G. Gallager, "Low-density parity-check codes," IRE Trans. Inform. Theory, vol. IT-8, pp. 21-28, Jan. 1962.
-
(1962)
IRE Trans. Inform. Theory
, vol.IT-8
, pp. 21-28
-
-
Gallager, R.G.1
-
6
-
-
0010036629
-
Correlation via linear sequential circuit approximation of combiners with memory
-
Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
-
J. D. Golić, "Correlation via linear sequential circuit approximation of combiners with memory," Advances in Cryptology - EUROCRYPT'92,Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113-123, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT'92
, vol.658
, pp. 113-123
-
-
Golić, J.D.1
-
7
-
-
84948958360
-
Linear cryptanalysis of stream ciphers
-
Lecture Notes in Computer Science, B. Preneel ed., SpringerVerlag
-
J. D. Golić, "Linear cryptanalysis of stream ciphers," Fast Software Encryption - Leuven'94,Lecture Notes in Computer Science, vol. 1008, B. Preneel ed., SpringerVerlag, pp. 154-169, 1995.
-
(1995)
Fast Software Encryption - Leuven'94
, vol.1008
, pp. 154-169
-
-
Golić, J.D.1
-
8
-
-
84955605202
-
Discrete optimisation and fast correlation attacks
-
Lecture Notes in Computer Science, E. Dawson and J. Golić eds., Springer-Verlag
-
J. D. Golić, M. Salmasizadeh, A. Clark, A. Khodkar, and E. Dawson, "Discrete optimisation and fast correlation attacks," Cryptographic Policy and Algorithms - Brisbane'95,Lecture Notes in Computer Science, vol. 1029, E. Dawson and J. Golić eds., Springer-Verlag, pp. 186-200, 1996.
-
(1996)
Cryptographic Policy and Algorithms - Brisbane'95
, vol.1029
, pp. 186-200
-
-
Golić, J.D.1
Salmasizadeh, M.2
Clark, A.3
Khodkar, A.4
Dawson, E.5
-
9
-
-
84894320743
-
New generalizations of the Reed-Muller codes, part I: Primitive codes
-
Mar
-
T. Kasami, S. Lin, and W. W. Peterson, "New generalizations of the Reed-Muller codes, part I: primitive codes," IEEE Trans. Inform. Theory, vol. IT-14, pp. 189-199, Mar. 1968.
-
(1968)
IEEE Trans. Inform. Theory
, vol.IT-14
, pp. 189-199
-
-
Kasami, T.1
Lin, S.2
Peterson, W.W.3
-
10
-
-
0017017134
-
An analysis of the structure and complexity of nonlinear binary sequence generators
-
Nov
-
E. L. Key, "An analysis of the structure and complexity of nonlinear binary sequence generators," IEEE Trans. Inform. Theory, vol. IT-22, pp. 732-736, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 732-736
-
-
Key, E.L.1
-
12
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
Jan
-
J. L. Massey, "Shift-register synthesis and BCH decoding," IEEE Trans. Inform. Theory, vol.IT-15, pp. 122-127, Jan. 1969.
-
(1969)
IEEE Trans. Inform. Theory
, vol.IT-15
, pp. 122-127
-
-
Massey, J.L.1
-
13
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Lecture Notes in Computer Science, T. Helleseth ed., Springer-Verlag
-
M. Matsui, "Linear cryptanalysis method for DES cipher," Advances in Cryptology - EUROCRYPT'93,Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pp. 386-397, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT'93
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
14
-
-
85030476632
-
New approaches to the design of self-synchronizing stream ciphers
-
Lecture Notes in Computer Science, D. W. Davies ed., Springer-Verlag
-
U. M. Maurer, "New approaches to the design of self-synchronizing stream ciphers," Advances in Cryptology EUROCRYPT'91,Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 458-471, 1991.
-
(1991)
Advances in Cryptology EUROCRYPT'91
, vol.547
, pp. 458-471
-
-
Maurer, U.M.1
-
15
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," Journal of Cryptology, vol. 1(3), pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
16
-
-
84962928435
-
Nonlinearity criteria for cryptographic functions
-
Lecture Notes in Computer Science, J.-J. Quisquater and J. Vandewalle eds., Springer-Verlag
-
W. Meier and O. Staffelbach, "Nonlinearity criteria for cryptographic functions," Advances in Cryptology - EUROCRYPT'89,Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater and J. Vandewalle eds., Springer-Verlag, pp. 549-562, 1990.
-
(1990)
Advances in Cryptology - EUROCRYPT'89
, vol.434
, pp. 549-562
-
-
Meier, W.1
Staffelbach, O.2
-
17
-
-
0026678847
-
Correlation properties of combiners with memory in stream ciphers
-
W. Meier and O. Staffelbach, "Correlation properties of combiners with memory in stream ciphers," Journal of Cryptology, vol. 5(1), pp. 67-86, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 67-86
-
-
Meier, W.1
Staffelbach, O.2
-
18
-
-
84974658205
-
A comparison of cryptanalytic principles based on iterative error-correction
-
Lecture Notes in Computer Science, D. W. Davies ed., Springer-Verlag
-
M. J. Mihaljević and J. D. Golić, "A comparison of cryptanalytic principles based on iterative error-correction," Advances in Cryptology - EUROCRYPT'91,Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 527-531, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT'91
, vol.547
, pp. 527-531
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
19
-
-
33745992035
-
Convergence of a Bayesian iterative error- correction procedure on a noisy shift register sequence
-
Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
-
M. J. Mihaljević and J. D. Golić, "Convergence of a Bayesian iterative error- correction procedure on a noisy shift register sequence," Advances in Cryptology - EUROCRYPT'92,Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 124-137, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT'92
, vol.658
, pp. 124-137
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
20
-
-
84955573259
-
Low order approximation of cipher functions
-
Lecture Notes in Computer Science, E. Dawson and J. Golić eds., Springer-Verlag
-
W. Millan, "Low order approximation of cipher functions," Cryptographic Policy and Algorithms - Brisbane'95,Lecture Notes in Computer Science, vol. 1029, E. Dawson and J. Golić eds., Springer-Verlag, pp. 144-155, 1996.
-
(1996)
Cryptographic Policy and Algorithms - Brisbane'95
, vol.1029
, pp. 144-155
-
-
Millan, W.1
-
22
-
-
0021489155
-
Correlation immunity of nonlinear combining functions for cryptographic applications
-
Sept
-
T. Siegenthaler, "Correlation immunity of nonlinear combining functions for cryptographic applications," IEEE Trans. Inform. Theory, vol. IT-30, pp. 776-780, Sept. 1984.
-
(1984)
IEEE Trans. Inform. Theory
, vol.IT-30
, pp. 776-780
-
-
Siegenthaler, T.1
-
23
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
Jan
-
T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only," IEEE Trans. Comput., vol. C-34, pp. 81-85, Jan. 1985.
-
(1985)
IEEE Trans. Comput
, vol.C-34
, pp. 81-85
-
-
Siegenthaler, T.1
-
24
-
-
85034624593
-
Cryptanalyst's representation of nonlinearly filtered ML- sequences
-
Lecture Notes in Computer Science, F. Pichler ed., Springer-Verlag
-
T. Siegenthaler, "Cryptanalyst's representation of nonlinearly filtered ML- sequences," Advances in Cryptology - EUROCRYPT'85,Lecture Notes in Computer Science, vol. 219, F. Pichler ed., Springer-Verlag, pp. 103-110, 1986.
-
(1986)
Advances in Cryptology - EUROCRYPT'85
, vol.219
, pp. 103-110
-
-
Siegenthaler, T.1
-
26
-
-
0024001951
-
A spectral characterization of correlation-immune combining functions
-
May
-
G. Z. Xiao and J. L. Massey, "A spectral characterization of correlation-immune combining functions," IEEE Trans. Inform. Theory, vol. IT-34, pp. 569-571, May 1988.
-
(1988)
IEEE Trans. Inform. Theory
, vol.IT-34
, pp. 569-571
-
-
Xiao, G.Z.1
Massey, J.L.2
-
27
-
-
85031821528
-
On the linear syndrome method in cryptanalysis
-
Lecture Notes in Computer Science, S. Goldwasser ed., Springer-Verlag
-
K. Zeng and M. Huang, "On the linear syndrome method in cryptanalysis," Advances in Cryptology - CRYPTO'88,Lecture Notes in Computer Science, vol. 403, S. Goldwasser ed., Springer-Verlag, pp. 469-478, 1990.
-
(1990)
Advances in Cryptology - CRYPTO'88
, vol.403
, pp. 469-478
-
-
Zeng, K.1
Huang, M.2
-
28
-
-
0006531518
-
On two probabilistic decoding algorithms for binary linear codes
-
Nov
-
M. V. Zivković, "On two probabilistic decoding algorithms for binary linear codes," IEEE Trans. Inform. Theory, vol. IT-37, pp. 1707-1716, Nov. 1991.
-
(1991)
IEEE Trans. Inform. Theory
, vol.IT-37
, pp. 1707-1716
-
-
Zivković, M.V.1
|