Improved multi-pass fast correlation attacks with applications
From MaRDI portal
Publication:350926
DOI10.1007/s11432-011-4295-7zbMath1267.94107OpenAlexW2066458137MaRDI QIDQ350926
Publication date: 3 July 2013
Published in: Science China. Information Sciences (Search for Journal in Brave)
Full work available at URL: http://engine.scichina.com/doi/10.1007/s11432-011-4295-7
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Related Items (2)
A new two-dimensional mutual coupled logistic map and its application for pseudorandom number generator ⋮ Novel way to research nonlinear feedback shift register
Cites Work
- A Mathematical Theory of Communication
- Fast correlation attacks on certain stream ciphers
- A fast correlation attack on LILI-128
- Vectorial approach to fast correlation attacks
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Shorter Bit Sequence Is Enough to Break Stream Cipher LILI-128
- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Multi-pass Fast Correlation Attack on Stream Ciphers
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Selected Areas in Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Improved multi-pass fast correlation attacks with applications