메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 300-315

Fast correlation attacks through reconstruction of linear polynomials

Author keywords

Correlation attacks; Learning theory; Reconstruction of polynomials; Stream ciphers

Indexed keywords

POLYNOMIALS; SHIFT REGISTERS;

EID: 84974625340     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_19     Document Type: Conference Paper
Times cited : (108)

References (20)
  • 13
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier, and O. Staffelbach, “Fast correlation attacks on certain stream ciphers”, Journal of Cryptology, vol. 1, 1989, pp. 159-176.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 16
    • 85032480688 scopus 로고
    • A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
    • Springer-Verlag
    • M. Mihaljevic, and J. Golic, “A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence”, Advances in Cryptology-AUSCRYPT’90, Lecture Notes in Computer Science, vol. 453, Springer-Verlag, 1990, pp. 165-175.
    • (1990) Advances in Cryptology-AUSCRYPT’90, Lecture Notes in Computer Science , vol.453 , pp. 165-175
    • Mihaljevic, M.1    Golic, J.2
  • 17
    • 84958958752 scopus 로고    scopus 로고
    • Correlation attacks on stream ciphers: Computing low weight parity checks based on error correcting codes
    • Springer-Verlag
    • W. Penzhorn, “Correlation attacks on stream ciphers: Computing low weight parity checks based on error correcting codes”, Fast Software Encryption, FSE’96, Lecture Notes in Computer Science, vol. 1039, Springer-Verlag, 1996, pp. 159-172.
    • (1996) Fast Software Encryption, FSE’96, Lecture Notes in Computer Science , vol.1039 , pp. 159-172
    • Penzhorn, W.1
  • 18
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • T. Siegenthaler, “Correlation-immunity of nonlinear combining functions for cryptographic applications”, IEEE Trans. on Information Theory, vol. IT-30, 1984, pp. 776-780.
    • (1984) IEEE Trans. on Information Theory , vol.IT-30 , pp. 776-780
    • Siegenthaler, T.1
  • 19
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only”, IEEE Trans. on Computers, vol. C-34, 1985, pp. 81-85.
    • (1985) IEEE Trans. on Computers , vol.C-34 , pp. 81-85
    • Siegenthaler, T.1
  • 20
    • 0031097176 scopus 로고    scopus 로고
    • Decoding of Reed Solomon codes beyond the error-correction bound
    • March
    • M. Sudan, “Decoding of Reed Solomon codes beyond the error-correction bound”, Journal of Complexity, vol. 13(1), March 1997, pp. 180-193.
    • (1997) Journal of Complexity , vol.13 , Issue.1 , pp. 180-193
    • Sudan, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.