Fast Correlation Attacks: Methods and Countermeasures (Q3013077): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Cryptanalysis of Grain / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374940 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3722412 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737246 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409140 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2834386 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413853 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434884 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: When Stream Cipher Analysis Meets Public-Key Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5538637 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear models for keystream generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation properties of a general binary combiner with memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast correlation attacks on the summation generator. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737248 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707427 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536809 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A fast correlation attack on LILI-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Feedback shift registers, 2-adic span, and combiners with memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved LPN Algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4146667 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Results on multiples of primitive polynomials and their products over GF(2) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shift-register synthesis and BCH decoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast correlation attacks on certain stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5202622 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation properties of combiners with memory in stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Correlation Attack Algorithm with List Decoding and an Application / rank
 
Normal rank
Property / cites work
 
Property / cites work: On ε‐biased generators in NC<sup>0</sup> / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036866 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect nonlinear S-boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: New stream cipher designs. The eSTREAM finalists / rank
 
Normal rank
Property / cites work
 
Property / cites work: On ``bent'' functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409125 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279562 / rank
 
Normal rank

Latest revision as of 06:58, 4 July 2024

scientific article
Language Label Description Also known as
English
Fast Correlation Attacks: Methods and Countermeasures
scientific article

    Statements

    Fast Correlation Attacks: Methods and Countermeasures (English)
    0 references
    0 references
    7 July 2011
    0 references
    stream cipher
    0 references
    cryptanalysis
    0 references
    correlation attack
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers