On A Fast Correlation Attack on Certain Stream Ciphers
From MaRDI portal
Publication:4037464
DOI10.1007/3-540-46416-6_16zbMATH Open0766.94002OpenAlexW1661175875MaRDI QIDQ4037464FDOQ4037464
Authors: Ben Smeets, Vladimir V. Chepyzhov
Publication date: 18 May 1993
Published in: Advances in Cryptology — EUROCRYPT ’91 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-46416-6_16
Recommendations
- Fast correlation attacks on certain stream ciphers
- An Improved Fast Correlation Attack on Stream Ciphers
- scientific article; zbMATH DE number 1759270
- Multi-pass Fast Correlation Attack on Stream Ciphers
- Survey of fast correlation attack of stream cipher
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 1304082
- Fast correlation attack on stream cipher ABC v3
- Fast Discrete Fourier Spectra Attacks on Stream Ciphers
- Correlation attacks on stream ciphers: computing low-weight parity checks based on error-correcting codes
Cited In (24)
- Advances in Cryptology – CRYPTO 2004
- Theoretical analysis of a correlation attack based on convolutional codes
- Title not available (Why is that?)
- Discrete optimisation and fast correlation attacks
- Cryptanalysis of an E0-like combiner with memory
- Fast correlation attacks on certain stream ciphers
- DIVIDE AND CONQUER ATTACKS ON CERTAIN CLASSES OF STREAM CIPHERS
- A survey on fast correlation attacks
- Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Title not available (Why is that?)
- Distribution of primitive polynomials over \(\mathrm{GF}(2)\) with respect to their weights
- Open questions on nonlinearity and on APN functions
- New secondary constructions of bent functions
- Symmetric random function generator (SRFG): a novel cryptographic primitive for designing fast and robust algorithms
- Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol
- Internal state recovery attack on stream ciphers: breaking BIVIUM
- Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
- Computation of low-weight parity checks for correlation attacks on stream ciphers
- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
This page was built for publication: On A Fast Correlation Attack on Certain Stream Ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4037464)