메뉴 건너뛰기




Volumn 1294, Issue , 1997, Pages 499-512

Edit distance correlation attack on the alternating step generator

Author keywords

Alternating step generator; Clock controlled shift registers; Correlation attacks; Cryptanalysis; Edit distance; Stream ciphers

Indexed keywords

BINS; CLOCKS; COMPUTATIONAL EFFICIENCY; SHIFT REGISTERS;

EID: 84958673691     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0052258     Document Type: Conference Paper
Times cited : (31)

References (13)
  • 1
    • 85034420736 scopus 로고
    • The stop-and-go generator
    • Lecture Notes in Computer Science, T. Beth, N. Cot, and I. Ingemarsson eds., Springer-Verlag
    • T. Beth and F. C. Piper, “The stop-and-go generator,” Advances in Cryptology - EUROCRYPT '84, Lecture Notes in Computer Science, vol. 209, T. Beth, N. Cot, and I. Ingemarsson eds., Springer-Verlag, pp. 88-92, 1985.
    • (1985) Advances in Cryptology - EUROCRYPT '84 , vol.209 , pp. 88-92
    • Beth, T.1    Piper, F.C.2
  • 2
    • 0025824847 scopus 로고
    • A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    • J. Dj. Golić and M. Mihaljević, “A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance,” Journal of Cryptology, vol. 3(3), pp. 201-212, 1991.
    • (1991) Journal of Cryptology , vol.3 , Issue.3 , pp. 201-212
    • Golić, J.D.1    Mihaljević, M.2
  • 3
    • 0008772856 scopus 로고
    • A generalized correlation attack with a probabilistic constrained edit distance
    • Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
    • J. Dj. Golić and S. Petrović, “A generalized correlation attack with a probabilistic constrained edit distance,” Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472-476, 1993.
    • (1993) Advances in Cryptology - EUROCRYPT '92 , vol.658 , pp. 472-476
    • Golić, J.D.1    Petrović, S.2
  • 4
    • 84948975118 scopus 로고
    • Embedding and probabilistic correlation attacks on clock-controlled shift registers
    • Lecture Notes m Computer Science, A. De Santis ed., Springer-Verlag
    • J. Dj. Golić and L. O'Connor, “Embedding and probabilistic correlation attacks on clock-controlled shift registers,” Advances in Cryptology - EUROCRYPT '94, Lecture Notes m Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 230-243, 1995.
    • (1995) Advances in Cryptology - EUROCRYPT '94 , vol.950 , pp. 230-243
    • Golić, J.D.1    O'connor, L.2
  • 5
    • 0030365319 scopus 로고    scopus 로고
    • Constrained embedding probability for two binary strings
    • J. Dj. Golid, “Constrained embedding probability for two binary strings,” SIAM Journal on Discrete Mathematics, voI. 9(3), pp. 360-364, 1996.
    • (1996) SIAM Journal on Discrete Mathematics, Voi , vol.9 , Issue.3 , pp. 360-364
    • Golid, J.D.1
  • 6
    • 84947998951 scopus 로고    scopus 로고
    • Edit distance correlation attacks on clock-controlled combiners with memory
    • J. Pieprzyk ed., Springer-Verlag
    • J. Dj. Golić, “Edit distance correlation attacks on clock-controlled combiners with memory,” Information Security and Privacy, Lecture Notes in Computer Science, vol. 1172, J. Pieprzyk ed., Springer-Verlag, pp. 169-181, 1996.
    • (1996) Information Security and Privacy, Lecture Notes in Computer Science , vol.1172 , pp. 169-181
    • Golić, J.D.1
  • 8
    • 85034847491 scopus 로고
    • Alternating step generators controlled by de Bruijn sequences
    • D. Chaum and W. L. Price eds., Springer-Verlag
    • C. G. Günther, “Alternating step generators controlled by de Bruijn sequences,” Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science, vol. 304, D. Chaum and W. L. Price eds., Springer-Verlag, pp. 5-14, 1988.
    • (1988) Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science , vol.304 , pp. 5-14
    • Günther, C.G.1
  • 9
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • Jan
    • J. L. Massey, “Shift-register synthesis and BCH decoding,” IEEE Trans. Inform. Theory, vol. IT-15, pp. 122-127, Jan. 1969.
    • (1969) IEEE Trans. Inform. Theory , vol.IT-15 , pp. 122-127
    • Massey, J.L.1
  • 10
    • 3843098329 scopus 로고
    • Cryptanalysis of a two-stage Gollmann cascade generator
    • Rome, Italy
    • R. Menicocci, “Cryptanalysis of a two-stage Gollmann cascade generator,” Proceedings of SPRC '93, Rome, Italy, pp. 62-69, 1993.
    • (1993) Proceedings of SPRC '93 , pp. 62-69
    • Menicocci, R.1
  • 11
    • 0346602660 scopus 로고
    • On the linear consistency test (LCT) in cryptanalysis with applications
    • G. Brassard ed., Springer-Verlag
    • K. Zeng, C. H. Yang, and T. R. N. Rao, “On the linear consistency test (LCT) in cryptanalysis with applications,” Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science, vol. 435, G. Brassard ed., Springer-Verlag, pp. 164-174, 1990.
    • (1990) Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science , vol.435 , pp. 164-174
    • Zeng, K.1    Yang, C.H.2    Rao, T.R.3
  • 12
    • 84955610054 scopus 로고
    • An improved linear syndrome algorithm in cryptanalysis with applications
    • A. J. Menezes and S. A. Vanstone eds., Springer-Verlag
    • K. Zeng, C. H. Yang, and T. It. N. Rao, “An improved linear syndrome algorithm in cryptanalysis with applications,” Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone eds., Springer-Verlag, pp. 34-47, 1991.
    • (1991) Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science , vol.537 , pp. 34-47
    • Zeng, K.1    Yang, C.H.2    Rao, T.I.N.3
  • 13
    • 0026219481 scopus 로고
    • An algorithm for the initial state reconstruction of the clockcontrolled shift register
    • M.V. Živković, “An algorithm for the initial state reconstruction of the clockcontrolled shift register,” IEEE Trana. Inform. Theory, vol. IT-37, pp. 1488-1490, Sept. 1991.
    • (1991) IEEE Trana. Inform. Theory , vol.IT-37 , pp. 1488-1490
    • Živković, M.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.