scientific article; zbMATH DE number 2086709
From MaRDI portal
Publication:4737247
Recommendations
Cited in
(24)- Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath
- Extended BDD-Based Cryptanalysis of Keystream Generators
- Complexity Theoretical Results on Nondeterministic Graph-driven Read-Once Branching Programs
- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations
- Attacking Bivium Using SAT Solvers
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Cryptanalysis of an E0-like combiner with memory
- OBDD-based cryptanalysis of oblivious keystream generators
- Self-shrinking chaotic stream ciphers
- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
- Algebraic attacks using binary decision diagrams
- Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator
- Cryptographic properties of the hidden weighted bit function
- Concatenations of the hidden weighted bit function and their cryptographic properties
- Improved multi-pass fast correlation attacks with applications
- Cryptanalysis of three mutually clock-controlled stop/go shift registers
- Improving OBDD attacks against stream ciphers
- Optimising Gröbner bases on Bivium
- A very simple function that requires exponential size nondeterministic graph-driven read-once branching programs
- Generalization of the Self-Shrinking Generator in the Galois Field
- De Bruijn sequences and complexity of symmetric functions
- An algebraic attack to the Bluetooth stream cipher \textsc{E0}
- A hybrid approach (SAT+ROBDD) to cryptanalysis of stream encryption systems
- How to Strengthen Pseudo-random Generators by Using Compression
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737247)