Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311545
Recommendations
- Correlation attacks on clock-controlled shift registers in keystream generators
- An improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
- Fast Software Encryption
- An Improved Fast Correlation Attack on Stream Ciphers
- Edit probability correlation attacks on stop/go clocked keystream generators
- scientific article; zbMATH DE number 1759339
- scientific article; zbMATH DE number 1676647
- On A Fast Correlation Attack on Certain Stream Ciphers
- scientific article; zbMATH DE number 1759270
Cited in
(13)- Walsh transforms and cryptographic applications in bias computing
- Side Channel Attacks on Irregularly Decimated Generators
- Fast Software Encryption
- scientific article; zbMATH DE number 1676647 (Why is no real title available?)
- Improved multi-pass fast correlation attacks with applications
- scientific article; zbMATH DE number 1588475 (Why is no real title available?)
- Two General Attacks on Pomaranch-Like Keystream Generators
- scientific article; zbMATH DE number 1759340 (Why is no real title available?)
- An improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
- Multidimensional linear distinguishing attacks and Boolean functions
- Correlated Keystreams in Moustique
- Improving bounds on probabilistic affine tests to estimate the nonlinearity of Boolean functions
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311545)