A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
DOI10.1007/BF00196912zbMATH Open0724.94007OpenAlexW1981205339WikidataQ122884520 ScholiaQ122884520MaRDI QIDQ2277233FDOQ2277233
Authors: J. Dj. Golić, Miodrag J. Mihaljević
Publication date: 1991
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00196912
Recommendations
- scientific article; zbMATH DE number 503362
- Correlation attacks on clock-controlled shift registers in keystream generators
- Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory
- Fast correlation attacks on certain stream ciphers
- On A Fast Correlation Attack on Certain Stream Ciphers
cryptanalysissequence comparisonLevenshtein distancecorrelation attackmemoryless functionclock-controlled shift registers
Cryptography (94A60) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55)
Cites Work
- Title not available (Why is that?)
- Fast correlation attacks on certain stream ciphers
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
- Longest common subsequences of two random sequences
- An Overview of Sequence Comparison: Time Warps, String Edits, and Macromolecules
- Recognition of Noisy Subsequences Using Constrained Edit Distances
- On the linear complexity of functions of periodic GF(q) sequences
- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
- Constrained string editing
- Title not available (Why is that?)
Cited In (8)
- Computation of edit probabilities and edit distances for the A5-type keystream generator
- Edit distance correlation attacks on clock-controlled combiners with memory
- A simple attack on some clock-controlled generators
- Mixer–a new stream cipher
- On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
- Constrained many-to-one string editing with memory
- A cryptanalysis of clock-controlled shift registers with multiple steps
- Correlation attacks on clock-controlled shift registers in keystream generators
This page was built for publication: A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2277233)