메뉴 건너뛰기




Volumn 1025, Issue , 1995, Pages 74-83

Computation of low-weight parity checks for correlation attacks on stream ciphers

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY;

EID: 84947926195     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-60693-9_10     Document Type: Conference Paper
Times cited : (21)

References (14)
  • 1
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," Journal of Cryptology, vol. 1, no. 3, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 2
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • July
    • D. Coppersmith, "Fast evaluation of logarithms in fields of characteristic two," IEEE Trans, on Information Theory, vol. IT-30, no. 4, pp. 587-594, July 1984.
    • (1984) IEEE Trans, on Information Theory , vol.IT-30 , Issue.4 , pp. 587-594
    • Coppersmith, D.1
  • 3
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • J. L. Massey, "Shift-register synthesis and BCH decoding," IEEE Trans. Information Theory, vol. IT-15, pp. 122-127, 1969.
    • (1969) IEEE Trans. Information Theory , vol.IT-15 , pp. 122-127
    • Massey, J.L.1
  • 4
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only," IEEE Trans. Computers, vol. C-34, pp. 81-85, 1985.
    • (1985) IEEE Trans. Computers , vol.C-34 , pp. 81-85
    • Siegenthaler, T.1
  • 5
    • 84939761077 scopus 로고
    • On nonlinear combinations of linear shift register sequences
    • in, les Arcs, France, June 21-25
    • J. O. Brüer, "On nonlinear combinations of linear shift register sequences," in Proc. IEEE ISIT, les Arcs, France, June 21-25 1982.
    • (1982) Proc. IEEE ISIT
    • Brüer, J.O.1
  • 6
    • 0015913785 scopus 로고
    • How to protect data with ciphers that are really hard to break
    • January
    • P. R. Geffe, "How to protect data with ciphers that are really hard to break," Electronics, pp. 99-101, January 1973.
    • (1973) Electronics , pp. 99-101
    • Geffe, P.R.1
  • 7
    • 0017555755 scopus 로고
    • Encryption schemes for computer confidentiality
    • November
    • V. S. Pless, "Encryption schemes for computer confidentiality," IEEE Trans. Computers, vol. C-26, pp. 1133-1136, November 1977.
    • (1977) IEEE Trans. Computers , vol.C-26 , pp. 1133-1136
    • Pless, V.S.1
  • 8
    • 85030473541 scopus 로고
    • On a fast correlation attack on stream ciphers
    • Springer-Verlag
    • C. Chepyzhov and B. Smeets, "On a fast correlation attack on stream ciphers," in Advances in Cryptology-EUROCRYPT '91. 1991, pp. 176-185, Springer-Verlag.
    • (1991) Advances in Cryptology-EUROCRYPT '91 , pp. 176-185
    • Chepyzhov, C.1    Smeets, B.2
  • 9
    • 84974658205 scopus 로고
    • A comparison of cryptanalytic principles based on iterative error-correction
    • Springer-Verlag
    • M. J. Mihaljevic and J. Golic, "A comparison of cryptanalytic principles based on iterative error-correction," in Advances in Cryptology-EUROCRYPT '91. 1991, pp. 527-531, Springer-Verlag.
    • (1991) Advances in Cryptology-EUROCRYPT '91 , pp. 527-531
    • Mihaljevic, M.J.1    Golic, J.2
  • 10
    • 85031821528 scopus 로고
    • On the linear syndrome method in cryptanalysis
    • Springer-Verlag
    • K. Zeng and M. Huang, "On the linear syndrome method in cryptanalysis," in Advances in Cryptology-CRYPTO '88. 1990, pp. 469-478, Springer-Verlag.
    • (1990) Advances in Cryptology-CRYPTO '88 , pp. 469-478
    • Zeng, K.1    Huang, M.2
  • 11
    • 0025239212 scopus 로고
    • Probability to meet in the middle
    • K. Nishimura and M. Sibuya, "Probability to meet in the middle," J. of Cryptology, vol. 2, no. 1, pp. 13-22, 1990.
    • (1990) J. of Cryptology , vol.2 , Issue.1 , pp. 13-22
    • Nishimura, K.1    Sibuya, M.2
  • 12
    • 0025465287 scopus 로고
    • Some comments on Zech's logarithm
    • July
    • K. Huber, "Some comments on Zech's logarithm," IEEE Trans. Information Theory, vol. IT-36, no. 4, pp. 946-950, July 1990.
    • (1990) IEEE Trans. Information Theory , vol.IT-36 , Issue.4 , pp. 946-950
    • Huber, K.1
  • 13
    • 84957014368 scopus 로고
    • Discrete logarithms and their cryptographic significance
    • Springer-Verlag
    • A. M. Odlyzko, "Discrete logarithms and their cryptographic significance," in Advances in Cryptology-EUROCRYPT '84 1985, pp. 224-314, Springer-Verlag.
    • (1985) Advances in Cryptology-EUROCRYPT '84 , pp. 224-314
    • Odlyzko, A.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.