A New Simple Technique to Attack Filter Generators and Related Ciphers
暂无分享,去创建一个
[1] Thomas Johansson,et al. Fast Correlation Attacks Based on Turbo Code Techniques , 1999, CRYPTO.
[2] Anne Canteaut,et al. Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.
[3] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[4] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[5] Ed Dawson,et al. Inversion Attack and Branching , 1999, Aust. Comput. J..
[6] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[7] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[8] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Tor Helleseth,et al. An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators , 2004, CRYPTO.
[11] Håvard Molland. Improved Linear Consistency Attack on Irregular Clocked Keystream Generators , 2004, FSE.
[12] Enes Pasalic. On Boolean Functions in Symmetric-Key Ciphers , 2003 .
[13] Thomas Johansson,et al. Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.
[14] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[15] William Millan,et al. The LILI-II Keystream Generator , 2002, ACISP.
[16] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[17] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[18] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[19] Ed Dawson,et al. Generalized Inversion Attack on Nonlinear Filter Generators , 2000, IEEE Trans. Computers.
[20] J. D. Golic. Computation of low-weight parity-check polynomials , 1996 .
[21] Jovan Dj. Golic. On the Security of Nonlinear Filter Generators , 1996, FSE.
[22] Thomas Johansson,et al. A fast correlation attack on LILI-128 , 2002, Inf. Process. Lett..
[23] Vladimir V. Chepyzhov,et al. A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers , 2000, FSE.
[24] Thomas M. Cover,et al. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing) , 2006 .
[25] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[26] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[27] William Millan,et al. LILI Keystream Generator , 2000, Selected Areas in Cryptography.
[28] E. Dawson,et al. The LILI-128 Keystream Generator , 2000 .
[29] Thomas Johansson,et al. Distinguishing Attacks on SOBER-t16 and t32 , 2002, FSE.
[30] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[31] Markku-Juhani O. Saarinen. A Time-Memory Tradeoff Attack Against LILI-128 , 2002, FSE.
[32] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[33] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[34] Shai Halevi,et al. Cryptanalysis of Stream Ciphers with Linear Masking , 2002, CRYPTO.
[35] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[36] Joseph Jean Boutros,et al. A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function , 2002, Selected Areas in Cryptography.