A survey on fast correlation attacks
From MaRDI portal
Publication:2376656
DOI10.1007/S12095-012-0062-XzbMATH Open1285.94037OpenAlexW2017931540MaRDI QIDQ2376656FDOQ2376656
Martin Hell, Thomas Johansson, Carl Löndahl, Martin Ågren
Publication date: 24 June 2013
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-012-0062-x
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast correlation attacks on certain stream ciphers
- Fast Correlation Attacks: Methods and Countermeasures
- An Improved LPN Algorithm
- Codes Which Detect Deception
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- Noise-tolerant learning, the parity problem, and the statistical query model
- Optimal decoding of linear codes for minimizing symbol error rate (Corresp.)
- Multi-pass Fast Correlation Attack on Stream Ciphers
- Fast evaluation of logarithms in fields of characteristic two
- Fast Correlation Attack Algorithm with List Decoding and an Application
- On A Fast Correlation Attack on Certain Stream Ciphers
- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes
- An optimum symbol-by-symbol decoding rule for linear codes
- Computation of low-weight parity checks for correlation attacks on stream ciphers
- Modeling Block Decoding Approaches for the Fast Correlation Attack
- Iterative optimum symbol-by-symbol decoding and fast correlation attacks
- Cryptography and Coding
- Topics in Cryptology – CT-RSA 2004
Cited In (7)
- Title not available (Why is that?)
- FASER128: Cryptanalysis and Its Countermeasure
- Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications
- Survey of information security
- Attacks Against Filter Generators Exploiting Monomial Mappings
- Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
- Fast Correlation Attacks: Methods and Countermeasures
This page was built for publication: A survey on fast correlation attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2376656)