-
1
-
-
84937419430
-
Cryptanalytic Time/ Memory/ Data Tradeoffs for Stream Ciphers
-
A. Biryukov and A. Shamir, “Cryptanalytic Time/ Memory/ Data Tradeoffs for Stream Ciphers”, Advances in Cryptology - ASIACRYPT2000, Lecture Notes in Computer Science, vol. 1976, pp. 1-13, 2000.
-
(2000)
Advances in Cryptology - ASIACRYPT2000, Lecture Notes in Computer Science
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
2
-
-
84948963512
-
Improved fast correlation attacks usingparit ycheck equations of weight 4 and 5
-
A. Canteaut and M. Trabbia, “Improved fast correlation attacks usingparit ycheck equations of weight 4 and 5,” Advances in Cryptology - EUROCRYPT’2000, Lecture Notes in Computer Science, vol. 1807, pp. 573-588, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT’2000, Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
3
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
V. V. Chepyzhov, T. Johansson and B. Smeets, “A simple algorithm for fast correlation attacks on stream ciphers,” Fast Software Encryption - FSE2000, Lecture Notes in Computer Science, vol. 1978, pp. 180-195, 2001.
-
(2001)
Fast Software Encryption - FSE2000, Lecture Notes in Computer Science
, vol.1978
, pp. 180-195
-
-
Chepyzhov, V.V.1
Johansson, T.2
Smeets, B.3
-
4
-
-
0002237791
-
List decodingfor noisy channels
-
P. Elias, “List decodingfor noisy channels,” Wescon Convention Record, Part 2, Institute of Radio Engineers (now IEEE), pp. 94-104, 1957.
-
(1957)
Wescon Convention Record, Part 2, Institute of Radio Engineers (Now IEEE)
, pp. 94-104
-
-
Elias, P.1
-
5
-
-
0024079508
-
Zero error capacity under list decoding
-
Sept
-
P. Elias, “Zero error capacity under list decoding,” IEEE Trans. Inform. Theory, vol 34, pp. 1070-1074, Sept. 1988.
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
, pp. 1070-1074
-
-
Elias, P.1
-
6
-
-
0025948524
-
Error-correctingco des for list decoding
-
Jan
-
P. Elias, “Error-correctingco des for list decoding,” IEEE Trans. Inform. Theory, vol 37, pp. 5-12, Jan. 1991.
-
(1991)
IEEE Trans. Inform. Theory
, vol.37
, pp. 5-12
-
-
Elias, P.1
-
7
-
-
0006562743
-
Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications
-
M. P. C. Fossorier, M. J. Mihaljević and H. Imai, “Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications,” Applied Algebra, Algebraic Algorithms and Error Correcting Codes -AAECC 13, Lecture Notes in Computer Science, vol. 1719, pp. 282-293, 1999.
-
(1999)
Applied Algebra, Algebraic Algorithms and Error Correcting Codes -AAECC 13, Lecture Notes in Computer Science
, vol.1719
, pp. 282-293
-
-
Fossorier, M.1
Mihaljević, M.J.2
Imai, H.3
-
8
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
T. Johansson and F. Jonsson, “Improved fast correlation attacks on stream ciphers via convolutional codes,” Advances in Cryptology - EUROCRYPT’99, Lecture Notes in Computer Science, vol. 1592, pp. 347-362, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT’99, Lecture Notes in Computer Science
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jonsson, F.2
-
9
-
-
84957062097
-
Fast correlation attacks based on turbo code techniques
-
T. Johansson and F. Jonsson, “Fast correlation attacks based on turbo code techniques,” Advances in Cryptology - CRYPTO’99, Lecture Notes in Computer Science, vol. 1666, pp. 181-197, 1999.
-
(1999)
Advances in Cryptology - CRYPTO’99, Lecture Notes in Computer Science
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jonsson, F.2
-
10
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials
-
T. Johansson and F. Jonsson, “Fast correlation attacks through reconstruction of linear polynomials,” Advances in Cryptology - CRYPTO2000, Lecture Notes in Computer Science, vol. 1880, pp. 300-315, 2000.
-
(2000)
Advances in Cryptology - CRYPTO2000, Lecture Notes in Computer Science
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jonsson, F.2
-
14
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1, pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
15
-
-
84974727960
-
A low-complexity and highperformance algorithm for the fast correlation attack
-
M. J. Mihaljević, M. P. C. Fossorier and H. Imai, “A low-complexity and highperformance algorithm for the fast correlation attack,” Fast Software Encryption - FSE2000, Lecture Notes in Computer Science, vol. 1978, pp. 196-212, 2001.
-
(2001)
Fast Software Encryption - FSE2000, Lecture Notes in Computer Science
, vol.1978
, pp. 196-212
-
-
Mihaljević, M.J.1
Fossorier, M.P.2
Imai, H.3
-
16
-
-
0035120138
-
An algorithm for cryptanalysis of certain keystream generators suitable for high-speed software and hardware implementations
-
M. J. Mihaljević, M. P. C. Fossorier and H. Imai, “An algorithm for cryptanalysis of certain keystream generators suitable for high-speed software and hardware implementations,” IEICE Trans. Fundamentals, vol. E84-A, pp. 311-318, Jan. 2001.
-
(2001)
IEICE Trans. Fundamentals, Vol. E84-A
, pp. 311-318
-
-
Mihaljević, M.J.1
Fossorier, M.P.2
Imai, H.3
-
17
-
-
0035311895
-
On decodingtec hniques for cryptanalysis of certain encryption algorithms
-
M. J. Mihaljević, M. P. C. Fossorier and H. Imai, “On decodingtec hniques for cryptanalysis of certain encryption algorithms,” IEICE Trans. Fundamentals, vol. E84-A, pp. 919-930, Apr. 2001.
-
(2001)
IEICE Trans. Fundamentals, Vol. E84-A
, pp. 919-930
-
-
Mihaljević, M.J.1
Fossorier, M.P.2
Imai, H.3
-
18
-
-
0034269942
-
A method for convergence analysis of iterative probabilistic decoding
-
M. J. Mihaljević and J. Dj. Golić, “A method for convergence analysis of iterative probabilistic decoding,” IEEE Trans. Inform. Theory, vol. 46, pp. 2206-2211, Sept. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 2206-2211
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
19
-
-
84958991752
-
-
NESSIE list of Accepted Submissions: Proposal for Synchronous Stream Cipher LILI-128, Nov
-
NESSIE list of Accepted Submissions: Proposal for Synchronous Stream Cipher LILI-128, Nov. 2000, http://www.cosic.esat.kuleuven.ac.be/nessie.
-
(2000)
-
-
-
20
-
-
0021786321
-
Decryptinga class of stream ciphers usingciphertext only
-
T. Siegenthaler, “Decryptinga class of stream ciphers usingciphertext only,” IEEE Trans. Comput., vol. C-34, pp. 81-85, 1985.
-
(1985)
IEEE Trans. Comput., Vol. C-34
, pp. 81-85
-
-
Siegenthaler, T.1
-
21
-
-
0002629128
-
List decoding
-
Research Laboratory of Electronics, MIT, Jan. 15
-
J. M. Wozencraft,“List decoding,”Quarterly Progress Report, vol. 48, pp. 90-95, Research Laboratory of Electronics, MIT, Jan. 15, 1958.
-
(1958)
Quarterly Progress Report
, vol.48
, pp. 90-95
-
-
Wozencraft, J.M.1
-
22
-
-
85031821528
-
On the linear syndrome method in cryptanalysis
-
K. Zeng and M. Huang, “On the linear syndrome method in cryptanalysis,” Advances in Cryptology - CRYPTO’88, Lecture Notes in Computer Science, vol. 403, pp. 469-478, 1990.
-
(1990)
Advances in Cryptology - CRYPTO’88
, vol.403
, pp. 469-478
-
-
Zengand, K.1
Huang, M.2
|