Correlation attacks on stream ciphers: computing low-weight parity checks based on error-correcting codes
From MaRDI portal
Publication:4593792
DOI10.1007/3-540-60865-6_51zbMATH Open1373.94927OpenAlexW1545049011MaRDI QIDQ4593792FDOQ4593792
Authors: Walter T. Penzhorn
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_51
Recommendations
- Computation of low-weight parity checks for correlation attacks on stream ciphers
- scientific article; zbMATH DE number 2086708
- Fast correlation attacks on certain stream ciphers
- Improved fast correlation attacts using parity-check equations of weight 4 and 5
- scientific article; zbMATH DE number 820496
Cited In (11)
- Fast Software Encryption
- Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications
- Cryptanalysis of an E0-like combiner with memory
- Improved fast correlation attacts using parity-check equations of weight 4 and 5
- A survey on fast correlation attacks
- On A Fast Correlation Attack on Certain Stream Ciphers
- Results on multiples of primitive polynomials and their products over GF(2)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Computation of low-weight parity checks for correlation attacks on stream ciphers
- Title not available (Why is that?)
This page was built for publication: Correlation attacks on stream ciphers: computing low-weight parity checks based on error-correcting codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593792)