Fast correlation attacks on certain stream ciphers

From MaRDI portal
Publication:1121241

DOI10.1007/BF02252874zbMath0673.94010WikidataQ121183443 ScholiaQ121183443MaRDI QIDQ1121241

Othmar Staffelbach, Willi Meier

Publication date: 1989

Published in: Journal of Cryptology (Search for Journal in Brave)




Related Items (77)

Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functionsWalsh transforms and cryptographic applications in bias computingGrain-like structures with minimal and maximal period sequencesFast correlation attacks on nonlinear filter generatorsCorrelation attacks on combination generatorsA survey on fast correlation attacksCryptanalysis of a Chaotic Stream Cipher and Its Improved SchemeA discrete logarithm-based approach to compute low-weight multiples of binary polynomialsFast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocolA new approach for finding low-weight polynomial multiplesMaking the BKW algorithm practical for LWECorrelation cube attacks: from weak-key distinguisher to key recoveryVariation on correlation immune Boolean and vectorial functionsImproved multi-pass fast correlation attacks with applicationsUnnamed ItemCorrelation properties of a general binary combiner with memoryA new lower bound on the second-order nonlinearity of a class of monomial bent functionsThe cycle structure of \(\mathrm{NFSR}(f^d)\) and its applicationsEfficient and extensive search for precise linear approximations with high correlations of full SNOW-VImproved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] ⋮ Construction of balanced Boolean functions with high nonlinearity and good autocorrelation propertiesFinding low-weight polynomial multiples using the rho methodGeneralized Hamming weights of linear codes from cryptographic functionsThe Stream Cipher HC-128Several MILP-Aided Attacks Against SNOW 2.0A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible NonlinearitiesA note on determine the greatest common subfamily of two NFSRs by Gröbner basisFour decades of research on bent functionsMixer–a new stream cipherFast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3GComputation of low-weight parity checks for correlation attacks on stream ciphersGood codes based on very sparse matricesThe decomposition of an NFSR into the cascade connection of two smaller NFSRs revisitedBreaking the stream ciphers F-FCSR-H and F-FCSR-16 in real timeLiterature survey on nonlinear components and chaotic nonlinear components of block ciphersA construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunityConcatenations of the hidden weighted bit function and their cryptographic propertiesA design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementationCorrelation properties of combiners with memory in stream ciphersEnhanced Boolean functions suitable for the filter model of pseudo-random generatorOn the Link of Some Semi-bent Functions with Kloosterman SumsAttacks Against Filter Generators Exploiting Monomial MappingsTwo constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacksFast Correlation Attacks: Methods and CountermeasuresThree classes of balanced vectorial semi-bent functionsAn improved degree evaluation method of NFSR-based cryptosystemsPractical cryptanalysis of Bluetooth encryption with condition maskingA systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller codeA trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functionsAn algorithmic framework for the generalized birthday problemOptimal parameters for the WG stream cipher familyCryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipherAn Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good NonlinearityUnnamed ItemA generalized correlation attack on a class of stream ciphers based on the Levenshtein distanceOptimal correlation attack on the multiplexer generatorRevisiting Correlation-Immunity in Filter GeneratorsОценки объемов окрестностей двоичных кодов в терминах их весовых спектровAn analysis and an improvement of iterative fast correlation attacksOn construction of correlation-immune functions via minimal functionsSecurity of Y-00 under heterodyne measurement and fast correlation attackA distinguisher for RNGs with LFSR post-processingOn the \(k\)-error linear complexities of De Bruijn sequencesCryptanalysis of an E0-like combiner with memoryAlgebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift RegistersAn Improved Fast Correlation Attack on Stream CiphersConstructing de Bruijn Sequences Based on a New Necessary ConditionDiscrete optimisation and fast correlation attacksGeneralization of one method of a filter generator key recoveryEfficient design methods of low-weight correlation-immune functions and revisiting their basic characterizationResults on multiples of primitive polynomials and their products over GF(2)Vectorial approach to fast correlation attacksAlgebraic attacks on grain-like keystream generatorsA fast correlation attack on LILI-128The method for constructing uniform planar approximations of the filter generatorStatistical weakness of multiplexed sequences



Cites Work


This page was built for publication: Fast correlation attacks on certain stream ciphers