Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428117
DOI10.1007/b11817zbMath1122.94346DBLPconf/crypto/2003OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428117
Frederik Armknecht, Matthias Krause
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Related Items (23)
The Cryptographic Power of Random Selection ⋮ An algebraic attack on the improved summation generator with 2-bit memory ⋮ Boolean functions of an odd number of variables with maximum algebraic immunity ⋮ Improved multi-pass fast correlation attacks with applications ⋮ On algebraic immunity of trace inverse functions on finite fields of characteristic two ⋮ The Stream Cipher HC-128 ⋮ On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity ⋮ On the construction of multi-output Boolean functions with optimal algebraic immunity ⋮ Algebraic immunity for cryptographically significant Boolean functions: analysis and construction ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\) ⋮ Practical cryptanalysis of Bluetooth encryption with condition masking ⋮ How to Strengthen Pseudo-random Generators by Using Compression ⋮ Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks ⋮ Sequences, DFT and Resistance against Fast Algebraic Attacks ⋮ Extended BDD-Based Cryptanalysis of Keystream Generators ⋮ Maximal values of generalized algebraic immunity ⋮ Hill Climbing Algorithms and Trivium ⋮ Cryptanalysis of an E0-like combiner with memory ⋮ An algorithm for the spectral immunity of binary sequence with period 2 n ⋮ Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher ⋮ An algebraic attack to the Bluetooth stream cipher \textsc{E0}
This page was built for publication: Advances in Cryptology - CRYPTO 2003