-
1
-
-
85030473541
-
On a fast correlation attack on stream ciphers
-
Advances in Cryptology-EUROCRYPT '91, D.W. Davies ed., Springer-Verlag
-
V. Chepyzhov and B. Smeets, "On a fast correlation attack on stream ciphers," Advances in Cryptology-EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 176-185, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
2
-
-
0028748559
-
Modem optimisation algorithms for cryptanalysis
-
A. J. Clark, "Modem optimisation algorithms for cryptanalysis," in Proceedings ofANZIIS '94, pp. 258-262, 1994.
-
(1994)
Proceedings ofANZIIS '94
, pp. 258-262
-
-
Clark, A.J.1
-
3
-
-
34248346024
-
Automated cryptanalysis of substitution ciphers
-
Oct
-
W. S. Forsyth and R. Safavi-Naini, "Automated cryptanalysis of substitution ciphers," Cryptologia, vol. 17, no. 4, pp. 407-418, Oct. 1993.
-
(1993)
Cryptologia
, vol.17
, Issue.4
, pp. 407-418
-
-
Forsyth, W.S.1
Safavi-Naini, R.2
-
4
-
-
84925405668
-
Low-density parity-check codes
-
Jan
-
R. G. Gallager, "Low-density parity-check codes," IRE Trans. Inform. Theory, vol. IT-8, pp. 21-28, Jan. 1962.
-
(1962)
IRE Trans. Inform. Theory
, vol.IT-8
, pp. 21-28
-
-
Gallager, R.G.1
-
5
-
-
0010036629
-
Correlation via linear sequential circuit approximation of combiners with memory
-
Advances in Cryptology-EUROCRYPT '92, R.A. Rueppel ed., Springer-Verlag
-
J. Dj. Golić, "Correlation via linear sequential circuit approximation of combiners with memory," Advances in Cryptology-EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113-123, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.658
, pp. 113-123
-
-
Golić, J.D.1
-
6
-
-
84955576147
-
On the security of shift register based keystream generators
-
Fast Software Encryption-Cambridge '93, R.J. Anderson ed
-
J. Dj. Golić, "On the security of shift register based keystream generators," Fast Software Encryption-Cambridge '93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., pp. 91-101, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.809
, pp. 91-101
-
-
Golić, J.D.1
-
7
-
-
26444479778
-
Optimization by simulated annealing
-
S. Kirkpatrick, C. D. Gelatt, Jr. and M. P. Vecchi, "Optimization by simulated annealing," Science, vol. 220, no. 4598, pp. 671-680, 1983.
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.D.2
Vecchi, M.P.3
-
9
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," Journal of Cryptology, vol. 1, pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
10
-
-
85032480688
-
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
-
Advances in Cryptology-AUSCRYPT '90, J. Seberry and J. Pieprzyk eds., Springer-Verlag
-
M. J. Mihaljević and J. Dj. Golić, "A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence," Advances in Cryptology-AUSCRYPT '90, Lecture Notes in Computer Science, vol. 453, J. Seberry and J. Pieprzyk eds., Springer-Verlag, pp. 165-175, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.453
, pp. 165-175
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
11
-
-
84974658205
-
A comparison of cryptanalytic principles based on iterative error-correction
-
Advances in Cryptology-EUROCRYPT '91, D.W. Davies ed., Springer-Verlag
-
M. J. Mihaljević and J. Dj. Golić, "A comparison of cryptanalytic principles based on iterative error-correction," Advances in Cryptology-EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 527-531, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 527-531
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
12
-
-
33745992035
-
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
-
Advances in Cryptology-EUROCRYPT '92, R.A. Rueppel ed., Springer-Verlag
-
M. J. Mihaljević and J. Dj. Golić, "Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence," Advances in Cryptology-EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 124-137, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.658
, pp. 124-137
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
13
-
-
0001859010
-
Stream Ciphers
-
G. Simmons ed., New York, TF. HF. Press
-
R. A. Rueppel, "Stream Ciphers," in Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., pp. 65-134, New York, TF. HF. Press, 1991.
-
(1991)
Contemporary Cryptology: The Science of Information Integrity
, pp. 65-134
-
-
Rueppel, R.A.1
-
14
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
Jan
-
T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only," IEEE Trans. Comput., vol. C-34, pp. 81-85, Jan. 1985.
-
(1985)
IEEE Trans. Comput
, vol.C-34
, pp. 81-85
-
-
Siegenthaler, T.1
-
15
-
-
85031821528
-
On the linear syndrome method in cryptanalysis
-
Advances in Cryptology-CRYPTO '88, S. Goldwasser ed., Springer-Verlag
-
K. Zeng and M. Huang, "On the linear syndrome method in cryptanalysis," Advances in Cryptology-CRYPTO '88, Lecture Notes in Computer Science, vol. 403, S. Goldwasser ed., Springer-Verlag, pp. 469-478, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 469-478
-
-
Zeng, K.1
Huang, M.2
-
16
-
-
0006531518
-
On two probabilistic decoding algorithms for binary linear codes
-
Nov
-
M. Živković, "On two probabilistic decoding algorithms for binary linear codes," IEEE Trans. Inform. Theory, vol. IT-37, pp. 1707-1716, Nov. 1991.
-
(1991)
IEEE Trans. Inform. Theory
, vol.IT-37
, pp. 1707-1716
-
-
Živković, M.1
|