Multiple-chi-square tests and their application on distinguishing attacks
暂无分享,去创建一个
[1] Maurice G. Kendall,et al. The advanced theory of statistics , 1945 .
[2] Karl Pearson F.R.S.. X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling , 2009 .
[3] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[4] Markku-Juhani O. Saarinen. Chosen-IV Statistical Attacks on eSTREAM Stream Ciphers , 2006 .
[5] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[6] Michael Vielhaber. Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack , 2007, IACR Cryptol. ePrint Arch..
[7] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.
[8] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[9] Shahram Khazaei,et al. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers , 2008, AFRICACRYPT.
[10] K. Pearson. On the Criterion that a Given System of Deviations from the Probable in the Case of a Correlated System of Variables is Such that it Can be Reasonably Supposed to have Arisen from Random Sampling , 1900 .
[11] Maurice G. Kendall,et al. The Advanced Theory of Statistics, Vol. 2: Inference and Relationship , 1979 .
[12] Eric Filiol,et al. A New Statistical Testing for Symmetric Ciphers and Hash Functions , 2002, ICICS.
[13] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.