Fast Correlation Attacks: Methods and Countermeasures
From MaRDI portal
Publication:3013077
DOI10.1007/978-3-642-21702-9_4zbMath1282.94056OpenAlexW1839165513MaRDI QIDQ3013077
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_4
Related Items (5)
Walsh transforms and cryptographic applications in bias computing ⋮ A survey on fast correlation attacks ⋮ Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 ⋮ Krip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift register ⋮ Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New stream cipher designs. The eSTREAM finalists
- Fast correlation attacks on certain stream ciphers
- Correlation properties of combiners with memory in stream ciphers
- On ``bent functions
- Feedback shift registers, 2-adic span, and combiners with memory
- A fast correlation attack on LILI-128
- Correlation properties of a general binary combiner with memory
- Fast correlation attacks on the summation generator.
- Results on multiples of primitive polynomials and their products over GF(2)
- Fast Correlation Attack Algorithm with List Decoding and an Application
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
- An Improved LPN Algorithm
- Cryptanalysis of Grain
- Communication Theory of Secrecy Systems*
- Perfect nonlinear S-boxes
- Linear models for keystream generators
- When Stream Cipher Analysis Meets Public-Key Cryptography
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- On ε‐biased generators in NC0
- Selected Areas in Cryptography
- Shift-register synthesis and BCH decoding
This page was built for publication: Fast Correlation Attacks: Methods and Countermeasures