Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
暂无分享,去创建一个
[1] Sanjit Chatterjee,et al. New Constructions of Constant Size Ciphertext HIBE Without Random Oracle , 2006, ICISC.
[2] Sourav Mukhopadhyay,et al. On the Effectiveness of TMTO and Exhaustive Search Attacks , 2006, IWSEC.
[3] Palash Sarkar,et al. A Parallel Algorithm for Extending Cryptographic Hash Functions , 2001, INDOCRYPT.
[4] Donghoon Chang,et al. A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model , 2004, IACR Cryptol. ePrint Arch..
[5] Sanjit Chatterjee,et al. Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model , 2005, ICISC.
[6] Palash Sarkar,et al. Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes , 2004, WISA.
[7] Palash Sarkar,et al. Nonlinearity Bounds and Constructions of Resilient Boolean Functions , 2000, CRYPTO.
[8] Palash Sarkar,et al. Efficient Implementation of "Large" Stream Cipher Systems , 2001, CHES.
[9] Jovan Dj. Golic. On the Security of Nonlinear Filter Generators , 1996, FSE.
[10] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[11] Palash Sarkar,et al. New Applications of Time Memory Data Tradeoffs , 2005, ASIACRYPT.
[12] Sourav Mukhopadhyay,et al. Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms , 2006, ICCSA.
[13] Sanjit Chatterjee,et al. Generalization of the Selective-ID Security Model for HIBE Protocols , 2006, Public Key Cryptography.
[14] Palash Sarkar,et al. PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation , 2003, FSE.
[15] Palash Sarkar,et al. Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves , 2003, ASIACRYPT.
[16] P. Sarkar,et al. Improved construction of nonlinear resilient S-boxes , 2002, IEEE Transactions on Information Theory.
[17] Sourav Mukhopadhyay,et al. Hardware architecture and trade-offs for generic inversion of one-way functions , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[18] Sanjit Chatterjee,et al. Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields , 2004, ICISC.
[19] Palash Sarkar. Masking-based domain extenders for UOWHFs: bounds and constructions , 2005, IEEE Transactions on Information Theory.
[20] Palash Sarkar. The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers , 2002, CRYPTO.
[21] Sanjeev Kumar Mishra. On Symmetrically Private Information Retrieval , 2000, IACR Cryptol. ePrint Arch..
[22] Alex Biryukov,et al. Improved Time-Memory Trade-Offs with Multiple Data , 2005, Selected Areas in Cryptography.
[23] Palash Sarkar,et al. Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point , 2004, Public Key Cryptography.
[24] Palash Sarkar,et al. Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract) , 2003, INDOCRYPT.
[25] Hideki Imai,et al. A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata Over GF (q) , 1999 .
[26] Palash Sarkar,et al. Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality , 1999, CRYPTO.
[27] Ed Dawson,et al. Generalized Inversion Attack on Nonlinear Filter Generators , 2000, IEEE Trans. Computers.
[28] Palash Sarkar,et al. Construction of Nonlinear Boolean Functions with Important Cryptographic Properties , 2000, EUROCRYPT.
[29] Palash Sarkar,et al. Enumeration of Correlation Immune Boolean Functions , 1999, ACISP.
[30] Sridhar Srinivasan. Journal Papers , 1999 .
[31] Palash Sarkar,et al. HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach , 2006, INDOCRYPT.
[32] Sangjin Lee,et al. Conditional Correlation Attack on Nonlinear Filter Generators , 1996, ASIACRYPT.
[33] Palash Sarkar. HEAD: Hybrid Encryption with Delegated Decryption Capability , 2004, INDOCRYPT.
[34] Palash Sarkar,et al. Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation , 2003, INDOCRYPT.
[35] Palash Sarkar. Pushdown Automaton with the Ability to Flip its Stack , 2001, Electron. Colloquium Comput. Complex..
[36] Ross J. Anderson. Searching for the Optimum Correlation Attack , 1994, FSE.
[37] Harald Niederreiter,et al. Introduction to finite fields and their applications: List of Symbols , 1986 .
[38] Sanjit Chatterjee,et al. Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks , 2006, IACR Cryptol. ePrint Arch..
[39] Palash Sarkar,et al. VLSI implementation of modulo multiplication using carry free addition , 1997, Proceedings Tenth International Conference on VLSI Design.
[40] Sourav Mukhopadhyay,et al. Application of LFSRs in Time/Memory Trade-Off Cryptanalysis , 2005, WISA.
[41] Douglas R. Stinson,et al. Frameproof and IPP Codes , 2001, INDOCRYPT.
[42] Sanjit Chatterjee,et al. Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext , 2006, INDOCRYPT.
[43] P.K. Mishra,et al. A parallel algorithm for computing simultaneous inversions with application to elliptic curve scalar multiplication , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[44] Ratna Dutta,et al. Provably Secure Authenticated Tree Based Group Key Agreement , 2004, ICICS.
[45] Palash Sarkar,et al. New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn) , 2004, ACNS.
[46] Palash Sarkar. Computing Shifts in 90/150 cellular automata sequences , 2003 .
[47] Palash Sarkar,et al. A brief history of cellular automata , 2000, CSUR.
[48] Jovan Dj. Golic,et al. Correlation via Linear Sequential Circuit Approximation of Combiners with memory , 1992, EUROCRYPT.
[49] Palash Sarkar,et al. Time-Memory Trade-Off Attacks on Multiplications and T-Functions , 2004, ASIACRYPT.
[50] Palash Sarkar,et al. A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation , 2006, FSE.
[51] Sanjit Chatterjee,et al. HIBE With Short Public Parameters Without Random Oracle , 2006, ASIACRYPT.