Extended BDD-Based Cryptanalysis of Keystream Generators
From MaRDI portal
Publication:5452244
Recommendations
Cites work
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- scientific article; zbMATH DE number 1088915 (Why is no real title available?)
- scientific article; zbMATH DE number 2086709 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Branching Programs and Binary Decision Diagrams
- Correlation properties of a general binary combiner with memory
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Feedback shift registers, 2-adic span, and combiners with memory
- Fibonacci and Galois representations of feedback-with-carry shift registers
- OBDD-based cryptanalysis of oblivious keystream generators
- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
- Two Trivial Attacks on Trivium
Cited in
(12)- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
- Attacking Bivium Using SAT Solvers
- Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath
- scientific article; zbMATH DE number 2086709 (Why is no real title available?)
- Cryptographic properties of the hidden weighted bit function
- A construction of Boolean functions with good cryptographic properties
- OBDD-based cryptanalysis of oblivious keystream generators
- Algebraic attacks using binary decision diagrams
- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations
- Improving OBDD attacks against stream ciphers
- De Bruijn sequences and complexity of symmetric functions
- A hybrid approach (SAT+ROBDD) to cryptanalysis of stream encryption systems
This page was built for publication: Extended BDD-Based Cryptanalysis of Keystream Generators
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5452244)