-
1
-
-
0016037512
-
Optimal decoding of linear codes for minimizing symbol error rate,”
-
March
-
L. Bahl, J. Cocke, F. Jelinek and J. Raviv, Optimal decoding of linear codes for minimizing symbol error rate,” IEEE Transactions on Information Theory, vol. IT-20, pp. 284-287, March 1974.
-
(1974)
IEEE Transactions on Information Theory
, vol.IT-20
, pp. 284-287
-
-
Bahl, L.1
Cocke, J.2
Jelinek, F.3
Raviv, J.4
-
2
-
-
85030473541
-
On fast correlation attack on certain stream ci- phers
-
V. Chepyzhov and B. Smeets, “On fast correlation attack on certain stream ci- phers”, Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 176-185, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
3
-
-
84958950262
-
A comparison of fast correlation attacks
-
A. Clark, J. Dj. Golić, and E. Dawson, “A comparison of fast correlation attacks,” Fast Software Encryption - FSE'96, Lecture Notes in Computer Science, vol. 1039, pp. 145-157, 1996.
-
(1996)
Fast Software Encryption - FSE'96, Lecture Notes in Computer Science
, vol.1039
, pp. 145-157
-
-
Clark, A.1
Golić, J.D.2
Dawson, E.3
-
5
-
-
0032647173
-
Reduced complexity iterative decoding of Low Density Parity Check codes based on Belief Propagation
-
M. P. C. Fossorier, M. J. Mihaljević and H. Imai, “Reduced complexity iterative decoding of Low Density Parity Check codes based on Belief Propagation”, IEEE Transactions on Communications, vol. 47, pp. 673-680, 1999.
-
(1999)
IEEE Transactions on Communications
, vol.47
, pp. 673-680
-
-
Fossorier, M.P.C.1
Mihaljević, M.J.2
Imai, H.3
-
6
-
-
0006562743
-
Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic appli- cations
-
M. P. C. Fossorier, M. J. Mihaljević and H. Imai, “Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic appli- cations”, Applied Algebra, Algebraic Algorithms and Error Correcting Codes - AAECC 13, Lecture Notes in Computer Science, vol. 1719, pp. 282-293, 1999.
-
(1999)
Applied Algebra, Algebraic Algorithms and Error Correcting Codes - AAECC 13, Lecture Notes in Computer Science
, vol.1719
, pp. 282-293
-
-
Fossorier, M.P.C.1
Mihaljević, M.J.2
Imai, H.3
-
8
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
T. Johansson and F. Jonsson, “Improved fast correlation attacks on stream ciphers via convolutional codes”, Advances in Cryptology - EUROCRYPT'99, Lecture No- tes in Computer Science, vol. 1592, pp. 347-362, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT'99, Lecture No- Tes in Computer Science
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jonsson, F.2
-
9
-
-
84957062097
-
Fast correlation attacks based on turbo code techni- ques
-
T. Johansson and F. Jonsson, “Fast correlation attacks based on turbo code techni- ques”, Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science, vol. 1666, pp. 181-197, 1999.
-
(1999)
Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jonsson, F.2
-
12
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1, pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
13
-
-
85032480688
-
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
-
M. J. Mihaljević and J. Dj. Golić, “A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence”, Advances in Crypto- logy - AUSCRYPT '90, Lecture Notes in Computer Science, vol. 453, pp. 165-175, 1990.
-
(1990)
Advances in Crypto- Logy - AUSCRYPT '90, Lecture Notes in Computer Science
, vol.453
, pp. 165-175
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
14
-
-
84974658205
-
A comparison of cryptanalytic principles based on iterative error-correction
-
M. J. Mihaljević and J. Dj. Golić, “A comparison of cryptanalytic principles based on iterative error-correction,” Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 527-531, 1991.
-
(1991)
Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science
, vol.547
, pp. 527-531
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
15
-
-
0034449342
-
-
Sorento, Italy
-
M. J. Mihaljević, M.P.C. Fossorier and H. Imai, “Novel fast correlation attack via iterative decoding of punctured simplex code”, Proceedings of IEEE ISIT'2000, Sorento, Italy, June 2000.
-
(2000)
Novel Fast Correlation Attack via Iterative Decoding of Punctured Simplex Code, Proceedings of IEEE ISIT'2000
-
-
Mihaljević, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
17
-
-
84958958752
-
Correlation attacks on stream ciphers: Computing low-weight pa- rity checks based on error-correcting codes
-
W. Penzhorn, “Correlation attacks on stream ciphers: Computing low-weight pa- rity checks based on error-correcting codes”, Fast Software Encryption - FSE'96, Lecture Notes in Computer Science, vol. 1039, pp. 159-172, 1996.
-
(1996)
Fast Software Encryption - FSE'96, Lecture Notes in Computer Science
, vol.1039
, pp. 159-172
-
-
Penzhorn, W.1
-
18
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only”, IEEE Transactions on Computers, vol. C-34, pp. 81-85, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.C-34
, pp. 81-85
-
-
Siegenthaler, T.1
-
19
-
-
85031821528
-
On the linear syndrome method in cryptanalysis
-
K. Zeng and M. Huang, “On the linear syndrome method in cryptanalysis,” Ad- vances in Cryptology - CRYPTO '88, Lecture Notes in Computer Science, vol. 403, pp. 469-478, 1990.
-
(1990)
Ad- Vances in Cryptology - CRYPTO '88, Lecture Notes in Computer Science
, vol.403
, pp. 469-478
-
-
Zeng, K.1
Huang, M.2
-
20
-
-
84955610054
-
An improved linear syndrome method in cryptanalysis with applications
-
K. Zeng, C.H. Yang and T.R.N. Rao, “An improved linear syndrome method in cryptanalysis with applications,” Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science, vol. 537, pp. 34-47, 1991.
-
(1991)
Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science
, vol.537
, pp. 34-47
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.N.3
|