Extended BDD-Based Cryptanalysis of Keystream Generators
From MaRDI portal
Publication:5452244
DOI10.1007/978-3-540-77360-3_2zbMath1154.94433OpenAlexW1561711668MaRDI QIDQ5452244
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_2
Related Items (7)
Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath ⋮ Algebraic Attacks Using Binary Decision Diagrams ⋮ Cryptographic properties of the hidden weighted bit function ⋮ Attacking Bivium Using SAT Solvers ⋮ De Bruijn sequences and complexity of symmetric functions ⋮ Improving OBDD attacks against stream ciphers ⋮ A construction of Boolean functions with good cryptographic properties
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- OBDD-based cryptanalysis of oblivious keystream generators
- Feedback shift registers, 2-adic span, and combiners with memory
- Correlation properties of a general binary combiner with memory
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
- Branching Programs and Binary Decision Diagrams
- Fibonacci and Galois representations of feedback-with-carry shift registers
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Two Trivial Attacks on Trivium
This page was built for publication: Extended BDD-Based Cryptanalysis of Keystream Generators