Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311547
DOI10.1007/B99099zbMath1104.94311OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311547
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Related Items (13)
Walsh transforms and cryptographic applications in bias computing ⋮ Correlation attacks on combination generators ⋮ A discrete logarithm-based approach to compute low-weight multiples of binary polynomials ⋮ A new approach for finding low-weight polynomial multiples ⋮ Fast near collision attack on the Grain v1 stream cipher ⋮ Improved multi-pass fast correlation attacks with applications ⋮ Several MILP-Aided Attacks Against SNOW 2.0 ⋮ Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G ⋮ Attacks Against Filter Generators Exploiting Monomial Mappings ⋮ Practical cryptanalysis of Bluetooth encryption with condition masking ⋮ Cryptanalysis of an E0-like combiner with memory ⋮ An Improved Fast Correlation Attack on Stream Ciphers ⋮ A generic method for investigating nonsingular Galois NFSRs
This page was built for publication: Advances in Cryptology – CRYPTO 2004