Cryptanalysis of an E0-like combiner with memory
From MaRDI portal
Publication:1021238
DOI10.1007/s00145-007-9017-3zbMath1161.94416OpenAlexW2087368856MaRDI QIDQ1021238
Publication date: 8 June 2009
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-007-9017-3
Related Items (4)
Walsh transforms and cryptographic applications in bias computing ⋮ PERIODS ON TWO KINDS OF NONLINEAR FEEDBACK SHIFT REGISTERS WITH TIME VARYING FEEDBACK FUNCTIONS ⋮ Practical cryptanalysis of Bluetooth encryption with condition masking ⋮ An overview of distinguishing attacks on stream ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Analysis and design of stream ciphers
- Fast correlation attacks on certain stream ciphers
- Correlation properties of combiners with memory in stream ciphers
- Correlation properties of a general binary combiner with memory
- Fast Correlation Attack Algorithm with List Decoding and an Application
- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
- On A Fast Correlation Attack on Certain Stream Ciphers
- On the inherent intractability of certain coding problems (Corresp.)
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
- A comparison of fast correlation attacks
- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes
- On the security of nonlinear filter generators
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Design Principles for Combiners with Memory
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- How Far Can We Go Beyond Linear Cryptanalysis?
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Fast Software Encryption
This page was built for publication: Cryptanalysis of an E0-like combiner with memory