Finding low-weight polynomial multiples using discrete logarithm
暂无分享,去创建一个
[1] Thomas Siegenthaler,et al. Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences , 1985, EUROCRYPT.
[2] Thomas Johansson,et al. Fast Correlation Attacks through Reconstruction of Linear Polynomials , 2000, CRYPTO.
[3] Vladimir V. Chepyzhov,et al. A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers , 2000, FSE.
[4] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[5] Thomas Johansson,et al. Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.
[6] Klaus Huber. Some comments on Zech's logarithms , 1990, IEEE Trans. Inf. Theory.
[7] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[8] Walter T. Penzhorn,et al. Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers , 1995, IMACC.
[9] Don Coppersmith,et al. Fast evaluation of logarithms in fields of characteristic two , 1984, IEEE Trans. Inf. Theory.
[10] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[11] Serge Vaudenay,et al. When Stream Cipher Analysis Meets Public-Key Cryptography , 2006, Selected Areas in Cryptography.
[12] G. J. Kuhn. The distribution of the degree of minimum-degree low-weight parity check polynomials , 1997, Proceedings of IEEE International Symposium on Information Theory.
[13] Thomas Johansson,et al. Fast Correlation Attacks Based on Turbo Code Techniques , 1999, CRYPTO.
[14] Anne Canteaut,et al. Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.
[15] Don Coppersmith. Evaluating logarithms in GF(2n) , 1984, STOC '84.
[16] Antoine Joux,et al. Fast Correlation Attacks: An Algorithmic Point of View , 2002, EUROCRYPT.