Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
DOI10.1007/11617983zbMATH Open1125.94009OpenAlexW4376524422MaRDI QIDQ5898593FDOQ5898593
Authors: Miodrag J. Mihaljević, Marc Fossorier, Hideki Imai
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11617983
Recommendations
cryptanalysisstream ciphersdecodingdecimationalgebraic attacksstate transition matrixkeystream generatorsfast correlation attackLFSRsoverdefined systems of nonlinear equations
Cryptography (94A60) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55)
Cited In (7)
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks
- Correlation cube attacks: from weak-key distinguisher to key recovery
- Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
- Security in Communication Networks
- On extended algebraic immunity
- Error-correcting codes and cryptography
This page was built for publication: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898593)