Primitive polynomials for robust scramblers and stream ciphers against reverse engineering
暂无分享,去创建一个
[1] Thomas Johansson,et al. Fast Correlation Attacks Based on Turbo Code Techniques , 1999, CRYPTO.
[2] Anne Canteaut,et al. Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.
[3] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[4] Willi Meier,et al. Fast Correlation Attacks on Stream Ciphers (Extended Abstract) , 1988, EUROCRYPT.
[5] R. A. Rueppel. Analysis and Design of Stream Ciphers , 2012 .
[6] Walter T. Penzhorn,et al. Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers , 1995, IMACC.
[7] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[8] Mathieu Cluzeau,et al. Reconstruction of a Linear Scrambler , 2007, IEEE Transactions on Computers.
[9] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[10] Vladimir V. Chepyzhov,et al. On A Fast Correlation Attack on Certain Stream Ciphers , 1991, EUROCRYPT.
[11] Eric Filiol,et al. Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators , 2000, FSE.
[12] Subhamoy Maitra,et al. Multiples of Primitive Polynomials over GF(2) , 2001, INDOCRYPT.
[13] Ayineedi Venkateswarlu,et al. Multiples of Primitive Polynomials and Their Products over GF(2) , 2002, Selected Areas in Cryptography.
[14] Subhamoy Maitra,et al. Primitive Polynomials over GF(2) - A Cryptologic Approach , 2001, ICICS.
[15] K Jambunathan. On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers , 2000, INDOCRYPT.
[16] Thomas Johansson,et al. Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.
[17] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[18] Walter T. Penzhorn,et al. Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes , 1996, FSE.
[19] Hideki Imai,et al. Modeling Block Decoding Approaches for the Fast Correlation Attack , 2007, IEEE Transactions on Information Theory.
[20] Bin Zhang,et al. An Improved Fast Correlation Attack on Stream Ciphers , 2009, Selected Areas in Cryptography.
[21] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.