Fast correlation attacks on certain stream ciphers
From MaRDI portal
Publication:1121241
DOI10.1007/BF02252874zbMath0673.94010WikidataQ121183443 ScholiaQ121183443MaRDI QIDQ1121241
Othmar Staffelbach, Willi Meier
Publication date: 1989
Published in: Journal of Cryptology (Search for Journal in Brave)
computational complexitycryptanalysiscorrelation attacksstream cipherlinear feedback shift register sequence
Related Items (77)
Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functions ⋮ Walsh transforms and cryptographic applications in bias computing ⋮ Grain-like structures with minimal and maximal period sequences ⋮ Fast correlation attacks on nonlinear filter generators ⋮ Correlation attacks on combination generators ⋮ A survey on fast correlation attacks ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ A discrete logarithm-based approach to compute low-weight multiples of binary polynomials ⋮ Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 ⋮ Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol ⋮ A new approach for finding low-weight polynomial multiples ⋮ Making the BKW algorithm practical for LWE ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Variation on correlation immune Boolean and vectorial functions ⋮ Improved multi-pass fast correlation attacks with applications ⋮ Unnamed Item ⋮ Correlation properties of a general binary combiner with memory ⋮ A new lower bound on the second-order nonlinearity of a class of monomial bent functions ⋮ The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications ⋮ Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V ⋮ Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] ⋮ Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties ⋮ Finding low-weight polynomial multiples using the rho method ⋮ Generalized Hamming weights of linear codes from cryptographic functions ⋮ The Stream Cipher HC-128 ⋮ Several MILP-Aided Attacks Against SNOW 2.0 ⋮ A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities ⋮ A note on determine the greatest common subfamily of two NFSRs by Gröbner basis ⋮ Four decades of research on bent functions ⋮ Mixer–a new stream cipher ⋮ Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G ⋮ Computation of low-weight parity checks for correlation attacks on stream ciphers ⋮ Good codes based on very sparse matrices ⋮ The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited ⋮ Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time ⋮ Literature survey on nonlinear components and chaotic nonlinear components of block ciphers ⋮ A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity ⋮ Concatenations of the hidden weighted bit function and their cryptographic properties ⋮ A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation ⋮ Correlation properties of combiners with memory in stream ciphers ⋮ Enhanced Boolean functions suitable for the filter model of pseudo-random generator ⋮ On the Link of Some Semi-bent Functions with Kloosterman Sums ⋮ Attacks Against Filter Generators Exploiting Monomial Mappings ⋮ Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks ⋮ Fast Correlation Attacks: Methods and Countermeasures ⋮ Three classes of balanced vectorial semi-bent functions ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Practical cryptanalysis of Bluetooth encryption with condition masking ⋮ A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller code ⋮ A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions ⋮ An algorithmic framework for the generalized birthday problem ⋮ Optimal parameters for the WG stream cipher family ⋮ Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher ⋮ An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity ⋮ Unnamed Item ⋮ A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance ⋮ Optimal correlation attack on the multiplexer generator ⋮ Revisiting Correlation-Immunity in Filter Generators ⋮ Оценки объемов окрестностей двоичных кодов в терминах их весовых спектров ⋮ An analysis and an improvement of iterative fast correlation attacks ⋮ On construction of correlation-immune functions via minimal functions ⋮ Security of Y-00 under heterodyne measurement and fast correlation attack ⋮ A distinguisher for RNGs with LFSR post-processing ⋮ On the \(k\)-error linear complexities of De Bruijn sequences ⋮ Cryptanalysis of an E0-like combiner with memory ⋮ Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers ⋮ An Improved Fast Correlation Attack on Stream Ciphers ⋮ Constructing de Bruijn Sequences Based on a New Necessary Condition ⋮ Discrete optimisation and fast correlation attacks ⋮ Generalization of one method of a filter generator key recovery ⋮ Efficient design methods of low-weight correlation-immune functions and revisiting their basic characterization ⋮ Results on multiples of primitive polynomials and their products over GF(2) ⋮ Vectorial approach to fast correlation attacks ⋮ Algebraic attacks on grain-like keystream generators ⋮ A fast correlation attack on LILI-128 ⋮ The method for constructing uniform planar approximations of the filter generator ⋮ Statistical weakness of multiplexed sequences
Cites Work
This page was built for publication: Fast correlation attacks on certain stream ciphers