Correlation attacks on combination generators
From MaRDI portal
Publication:2376654
DOI10.1007/s12095-012-0069-3zbMath1267.68110OpenAlexW1988065548MaRDI QIDQ2376654
Anne Canteaut, María Naya-Plasencia
Publication date: 24 June 2013
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-012-0069-3
Related Items (2)
Correlation attacks on combination generators ⋮ Attacks Against Filter Generators Exploiting Monomial Mappings
Uses Software
Cites Work
- An overview of distinguishing attacks on stream ciphers
- Fast correlation attacks on certain stream ciphers
- Maximum correlation analysis of nonlinear combining functions in stream ciphers
- Correlation attacks on combination generators
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
- Multidimensional Extension of Matsui’s Algorithm 2
- Cryptanalysis of Achterbahn-128/80
- Cryptanalysis of Achterbahn
- On Linear Cryptanalysis with Many Linear Approximations
- Algorithmic Cryptanalysis
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology - CRYPTO 2003
- Cryptanalysis of Achterbahn-Version 2
- Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
- Fast Software Encryption
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Correlation attacks on combination generators