The following pages link to (Q4737246):
Displaying 31 items.
- Walsh transforms and cryptographic applications in bias computing (Q276565) (← links)
- Improved multi-pass fast correlation attacks with applications (Q350926) (← links)
- Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications (Q398976) (← links)
- The extended \(k\)-tree algorithm (Q431783) (← links)
- Cryptanalysis of an E0-like combiner with memory (Q1021238) (← links)
- Correlation cube attacks: from weak-key distinguisher to key recovery (Q1648859) (← links)
- Practical cryptanalysis of Bluetooth encryption with condition masking (Q1753167) (← links)
- A generic method for investigating nonsingular Galois NFSRs (Q2115724) (← links)
- A new approach for finding low-weight polynomial multiples (Q2151296) (← links)
- Making the BKW algorithm practical for LWE (Q2152043) (← links)
- A correlation attack on full SNOW-V and SNOW-Vi (Q2170078) (← links)
- Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G (Q2205894) (← links)
- Correlation attacks on combination generators (Q2376654) (← links)
- A survey on fast correlation attacks (Q2376656) (← links)
- Vectorial approach to fast correlation attacks (Q2572957) (← links)
- A discrete logarithm-based approach to compute low-weight multiples of binary polynomials (Q2634391) (← links)
- Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V (Q2673990) (← links)
- Polynomial-time targeted attacks on coin tossing for any number of corruptions (Q2697882) (← links)
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries (Q2849382) (← links)
- Fast Correlation Attacks: Methods and Countermeasures (Q3013077) (← links)
- On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i + 1, 2 j + 1} (Q3104686) (← links)
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers (Q3644200) (← links)
- An Improved Fast Correlation Attack on Stream Ciphers (Q3644202) (← links)
- Attacks Against Filter Generators Exploiting Monomial Mappings (Q4639472) (← links)
- Correlation (Fast) Attack against Nonlinear Combination Generator (Q5069739) (← links)
- Discrete optimisation and fast correlation attacks (Q5235422) (← links)
- Finding low-weight polynomial multiples using the rho method (Q6103104) (← links)
- Several MILP-Aided Attacks Against SNOW 2.0 (Q6162381) (← links)
- Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW (Q6544471) (← links)
- GL-S-NFSR: a new NFSR structure and its period properties (Q6587211) (← links)
- Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers (Q6632040) (← links)