Edit distance correlation attacks on clock-controlled combiners with memory
From MaRDI portal
Publication:6570951
DOI10.1007/BFB0023297zbMATH Open1541.94051MaRDI QIDQ6570951FDOQ6570951
Authors: J. Dj. Golić
Publication date: 11 July 2024
Recommendations
- Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory
- Correlation attacks on clock-controlled shift registers in keystream generators
- scientific article; zbMATH DE number 1088256
- scientific article; zbMATH DE number 503362
- scientific article; zbMATH DE number 1740042
Cryptography (94A60) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55)
Cites Work
- Fast correlation attacks on certain stream ciphers
- Correlation properties of combiners with memory in stream ciphers
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
- A spectral characterization of correlation-immune combining functions
- Title not available (Why is that?)
- Uniform Random Number Generators
- A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
- Title not available (Why is that?)
- Correlation properties of a general binary combiner with memory
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Linear models for keystream generators
- Minimal linear equivalent analysis of a variable-memory binary sequence generator
- On the security of shift register based keystream generators
- Title not available (Why is that?)
This page was built for publication: Edit distance correlation attacks on clock-controlled combiners with memory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6570951)