메뉴 건너뛰기




Volumn 1172, Issue , 1996, Pages 169-181

Edit distance correlation attacks on clock-controlled combiners with memory

Author keywords

[No Author keywords available]

Indexed keywords

CLOCKS; COMPUTATIONAL EFFICIENCY; SECURITY OF DATA; SHIFT REGISTERS;

EID: 84947998951     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0023297     Document Type: Conference Paper
Times cited : (2)

References (21)
  • 1
    • 84974670663 scopus 로고
    • The shrinking generator
    • Lecture Notes in Computer Science, D. R. Stinson ed., Springer-Verlag
    • D. Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator," Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science, vol. 773, D. R. Stinson ed., Springer-Verlag, pp. 22-39, 1994.
    • (1994) Advances in Cryptology - CRYPTO '93 , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 2
    • 0025229050 scopus 로고
    • Minimal linear equivalent analysis of a variable-memory binary sequence generator
    • IT-36, Jan
    • J. Dj. Golić and M. J. Mihaljević, "Minimal linear equivalent analysis of a variable-memory binary sequence generator," IEEE Trans. Inform. Theory, vol. IT-36, pp. 190-192, Jan. 1990.
    • (1990) IEEE Trans. Inform. Theory , pp. 190-192
    • Golić, J.D.1    Mihaljević, M.J.2
  • 3
    • 0025824847 scopus 로고
    • A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    • J. Dj. Golić and M. J. Mihaljević, "A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance," J. Cryptology, vol. 3(3), pp. 201-212, 1991.
    • (1991) J. Cryptology , vol.3 , Issue.3 , pp. 201-212
    • Golić, J.D.1    Mihaljević, M.J.2
  • 4
    • 0010036629 scopus 로고
    • Correlation via linear sequential circuit approximation of combiners with memory
    • Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
    • J. Dj. Golić, "Correlation via linear sequential circuit approximation of combiners with memory," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113-123, 1993.
    • (1993) Advances in Cryptology - EUROCRYPT '92 , vol.658 , pp. 113-123
    • Golić, J.D.1
  • 5
    • 0008772856 scopus 로고
    • A generalized correlation attack with a probabilistic constrained edit distance
    • Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
    • J. Dj. Golić and S. V. Petrovic, "A generalized correlation attack with a probabilistic constrained edit distance," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472-476, 1993.
    • (1993) Advances in Cryptology - EUROCRYPT '92 , vol.658 , pp. 472-476
    • Golić, J.D.1    Petrovic, S.V.2
  • 6
    • 84955576147 scopus 로고
    • On the security of shift register based keystream generators
    • Lecture Notes in Computer Science, R. J. Anderson ed., Springer-Verlag
    • J. Dj. Golić, "On the security of shift register based keystream generators," Fast Software Encryption - Cambridge '93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90-100, 1994.
    • (1994) Fast Software Encryption - Cambridge '93 , vol.809 , pp. 90-100
    • Golić, J.D.1
  • 7
    • 84948975118 scopus 로고
    • Embedding and probabilistic correlation attacks on clock-controlled shift registers
    • Lecture Notes in Computer Science, A. De Santis ed., Springer-Verlag
    • J. Dj. Golić and L. O’Connor, "Embedding and probabilistic correlation attacks on clock-controlled shift registers," Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 230-243, 1995.
    • (1995) Advances in Cryptology - EUROCRYPT '94 , vol.950 , pp. 230-243
    • Golić, J.D.1    O’Connor, L.2
  • 8
    • 84955594784 scopus 로고
    • Intrinsic statistical weakness of keystream generators
    • Lecture Notes in Computer Science, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag
    • J. Dj. Golić, "Intrinsic statistical weakness of keystream generators," Advances in Cryptology - ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91-103, 1995.
    • (1995) Advances in Cryptology - ASIACRYPT '94 , vol.917 , pp. 91-103
    • Golić, J.D.1
  • 9
    • 0242549872 scopus 로고    scopus 로고
    • Correlation properties of a general binary combiner with memory
    • J. Dj. Golić, "Correlation properties of a general binary combiner with memory," J. Cryptology, vol. 9(2), pp. 111-126, 1996.
    • (1996) J. Cryptology , vol.9 , Issue.2 , pp. 111-126
    • Golić, J.D.1
  • 10
    • 33646781163 scopus 로고    scopus 로고
    • Linear models for keystream generators
    • C-45
    • J. Dj. Golić, "Linear models for keystream generators," IEEE Trans. Comput., vol. C-45, pp. 41-49, 1996.
    • (1996) IEEE Trans. Comput. , pp. 41-49
    • Golić, J.D.1
  • 11
    • 0024665232 scopus 로고
    • Clock-controlled shift registers: A review
    • May
    • D. Gollmann and W. G. Chambers, "Clock-controlled shift registers: a review," IEEE J. Select. Areas Commun., vol. 7(4), pp. 525-533, May 1989.
    • (1989) IEEE J. Select. Areas Commun. , vol.7 , Issue.4 , pp. 525-533
    • Gollmann, D.1    Chambers, W.G.2
  • 13
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," J. Cryptology, vol. 1(3), pp. 159-176, 1989.
    • (1989) J. Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 14
    • 0026678847 scopus 로고
    • Correlation properties of combiners with memory in stream ciphers
    • W. Meier and O. Staffelbach, "Correlation properties of combiners with memory in stream ciphers," J. Cryptology, vol. 5(1), pp. 67-86, 1992.
    • (1992) J. Cryptology , vol.5 , Issue.1 , pp. 67-86
    • Meier, W.1    Staffelbach, O.2
  • 15
    • 85028870469 scopus 로고
    • An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure
    • Lecture Notes in Computer Science, J. Seberry and Y. Zheng eds., Springer-Verlag
    • M. J. Mihaljević, "An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure," Advances in Cryptology - AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, J. Seberry and Y. Zheng eds., Springer-Verlag, pp. 349-356, 1993.
    • (1993) Advances in Cryptology - AUSCRYPT '92 , vol.718 , pp. 349-356
    • Mihaljević, M.J.1
  • 16
    • 84947952147 scopus 로고
    • Correlation immunity and the summation generator
    • Lecture Notes in Computer Science, H. C. Williams ed., Springer-Verlag
    • R. A. Rueppel, "Correlation immunity and the summation generator," Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, vol. 218, H. C. Williams ed., Springer-Verlag, pp. 260-272, 1986.
    • (1986) Advances in Cryptology - CRYPTO '85 , vol.218 , pp. 260-272
    • Rueppel, R.A.1
  • 18
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • IT-30, Sep
    • T. Siegenthaler, "Correlation-immunity of nonlinear combining functions for cryptographic applications," IEEE Trans. Inform. Theory, vol. IT-30, pp. 776-780, Sep. 1984.
    • (1984) IEEE Trans. Inform. Theory , pp. 776-780
    • Siegenthaler, T.1
  • 19
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • C-34, Jan
    • T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only," IEEE Trans. Comput., vol. C-34, pp. 81-85, Jan. 1985.
    • (1985) IEEE Trans. Comput. , pp. 81-85
    • Siegenthaler, T.1
  • 20
    • 0024001951 scopus 로고
    • A spectral characterization of correlation-immune combining functions
    • IT-34, May
    • G. Z. Xiao and J. L. Massey, "A spectral characterization of correlation-immune combining functions," IEEE Trans. Inform. Theory, vol. IT-34, pp. 569-571, May 1988.
    • (1988) IEEE Trans. Inform. Theory , pp. 569-571
    • Xiao, G.Z.1    Massey, J.L.2
  • 21
    • 0026219481 scopus 로고
    • An algorithm for the initial state reconstruction of the clock-controlled shift register
    • IT-37, Sep
    • M. V. Živković, "An algorithm for the initial state reconstruction of the clock-controlled shift register," IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488-1490, Sep. 1991.
    • (1991) IEEE Trans. Inform. Theory , pp. 1488-1490
    • Živković, M.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.