메뉴 건너뛰기




Volumn 1039, Issue , 1996, Pages 159-172

Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTATIONAL EFFICIENCY; CRYPTOGRAPHY; POLYNOMIALS; SHIFT REGISTERS;

EID: 84958958752     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-60865-6_51     Document Type: Conference Paper
Times cited : (25)

References (11)
  • 1
    • 84939761077 scopus 로고
    • On nonlinear combinations of linear shift register sequences
    • les Arcs, France, June 21-25
    • J. O. Brüer, "On nonlinear combinations of linear shift register sequences", in Proc. IEEE ISIT, les Arcs, France, June 21-25 1982.
    • (1982) Proc. IEEE ISIT
    • Brüer, J.O.1
  • 2
    • 85030473541 scopus 로고    scopus 로고
    • C. Chepyzhov and B. Smeets, "On a fast correlation attack on stream ciphers", in Advances in Cryptology - EUROCRYPT '91. 1991, ypp. 176-185, Springer-Verlag.
    • Chepyzhov, C.1    Smeets, B.2
  • 3
    • 0015913785 scopus 로고
    • How to protect data with ciphers that are really hard to break
    • January
    • P. R. Geffe, "How to protect data with ciphers that are really hard to break", Electronics, pp. 99-101, January 1973.
    • (1973) Electronics , pp. 99-101
    • Geffe, P.R.1
  • 4
    • 0003476270 scopus 로고
    • Fundamentals and applications, Prentice-Hall
    • S. Lin and D. Costello, Error control coding: Fundamentals and applications, Prentice-Hall, 1983.
    • (1983) Error Control Coding
    • Lin, S.1    Costello, D.2
  • 5
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • J. L. Massey, "Shift-register synthesis and BCH decoding", IEEE Trans. Information Theory, vol. IT-15, pp. 122-127, 1969.
    • (1969) IEEE Trans. Information Theory , vol.15 , pp. 122-127
    • Massey, J.L.1
  • 6
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers", Journal of Cryptology, vol. 1, no. 3, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 7
    • 84974658205 scopus 로고    scopus 로고
    • M. J. Mihaljevic and J. Golic, "A comparison of cryptanalytic principles based on iterative error-correction", in Advances in Cryptology - EUROCRYPT '91. 1991, pp. 527-531, Springer-Verlag.
    • Mihaljevic, M.J.1    Golic, J.2
  • 8
    • 0025239212 scopus 로고
    • Probability to meet in the middle
    • K. Nishimura and M. Sibuya, "Probability to meet in the middle", J. of Cryptology, vol. 2, no. 1, pp. 13-22, 1990.
    • (1990) J. Of Cryptology , vol.2 , Issue.1 , pp. 13-22
    • Nishimura, K.1    Sibuya, M.2
  • 9
    • 0017555755 scopus 로고
    • Encryption schemes for computer confidentiality
    • November
    • V. S. Pless, "Encryption schemes for computer confidentiality", IEEE Trans. Computers, vol. C-26, pp. 1133-1136, November 1977.
    • (1977) IEEE Trans. Computers , vol.26 , pp. 1133-1136
    • Pless, V.S.1
  • 10
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only", IEEE Trans. Computers, vol. C-34, pp. 81-85, 1985.
    • (1985) IEEE Trans. Computers , vol.34 , pp. 81-85
    • Siegenthaler, T.1
  • 11
    • 85031821528 scopus 로고    scopus 로고
    • K. Zeng and M. Huang, "On the linear syndrome method in cryptanarysis", in Advances in Cryptology - CRYPTO '88. 1990, pp. 469-478, Springer-Verlag.
    • Zeng, K.1    Huang, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.