A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance (Q2277233): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Longest common subsequences of two random sequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the linear complexity of functions of periodic GF(q) sequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5528329 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast correlation attacks on certain stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained string editing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Recognition of Noisy Subsequences Using Constrained Edit Distances / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3811745 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Overview of Sequence Comparison: Time Warps, String Edits, and Macromolecules / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.) / rank
 
Normal rank

Revision as of 16:14, 21 June 2024

scientific article
Language Label Description Also known as
English
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
scientific article

    Statements

    A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance (English)
    0 references
    0 references
    0 references
    0 references
    1991
    0 references
    0 references
    correlation attack
    0 references
    sequence comparison
    0 references
    cryptanalysis
    0 references
    memoryless function
    0 references
    clock-controlled shift registers
    0 references
    Levenshtein distance
    0 references
    0 references