Edit distance correlation attacks on clock-controlled combiners with memory
From MaRDI portal
Publication:6570951
DOI10.1007/BFB0023297zbMATH Open1541.94051MaRDI QIDQ6570951
Publication date: 11 July 2024
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast correlation attacks on certain stream ciphers
- Correlation properties of combiners with memory in stream ciphers
- Correlation properties of a general binary combiner with memory
- A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
- Minimal linear equivalent analysis of a variable-memory binary sequence generator
- A spectral characterization of correlation-immune combining functions
- Linear models for keystream generators
- On the security of shift register based keystream generators
- Uniform Random Number Generators
This page was built for publication: Edit distance correlation attacks on clock-controlled combiners with memory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6570951)