Pages that link to "Item:Q1121241"
From MaRDI portal
The following pages link to Fast correlation attacks on certain stream ciphers (Q1121241):
Displaying 50 items.
- Walsh transforms and cryptographic applications in bias computing (Q276565) (← links)
- Fast correlation attacks on nonlinear filter generators (Q287225) (← links)
- Variation on correlation immune Boolean and vectorial functions (Q340189) (← links)
- Improved multi-pass fast correlation attacks with applications (Q350926) (← links)
- Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications (Q398976) (← links)
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time (Q451122) (← links)
- Concatenations of the hidden weighted bit function and their cryptographic properties (Q476337) (← links)
- Enhanced Boolean functions suitable for the filter model of pseudo-random generator (Q494592) (← links)
- Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks (Q498981) (← links)
- A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation (Q662198) (← links)
- Efficient design methods of low-weight correlation-immune functions and revisiting their basic characterization (Q777373) (← links)
- Grain-like structures with minimal and maximal period sequences (Q831159) (← links)
- A note on determine the greatest common subfamily of two NFSRs by Gröbner basis (Q905163) (← links)
- Four decades of research on bent functions (Q908040) (← links)
- Optimal correlation attack on the multiplexer generator (Q989503) (← links)
- Security of Y-00 under heterodyne measurement and fast correlation attack (Q1017329) (← links)
- Cryptanalysis of an E0-like combiner with memory (Q1021238) (← links)
- Correlation properties of combiners with memory in stream ciphers (Q1184509) (← links)
- A fast correlation attack on LILI-128 (Q1603511) (← links)
- Correlation cube attacks: from weak-key distinguisher to key recovery (Q1648859) (← links)
- Practical cryptanalysis of Bluetooth encryption with condition masking (Q1753167) (← links)
- Statistical weakness of multiplexed sequences (Q1867455) (← links)
- Correlation properties of a general binary combiner with memory (Q1916030) (← links)
- Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties (Q1936502) (← links)
- A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions (Q1999897) (← links)
- An algorithmic framework for the generalized birthday problem (Q1999907) (← links)
- Optimal parameters for the WG stream cipher family (Q2016392) (← links)
- Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher (Q2016428) (← links)
- A distinguisher for RNGs with LFSR post-processing (Q2057160) (← links)
- On the \(k\)-error linear complexities of De Bruijn sequences (Q2057161) (← links)
- Algebraic attacks on grain-like keystream generators (Q2104441) (← links)
- A new approach for finding low-weight polynomial multiples (Q2151296) (← links)
- Making the BKW algorithm practical for LWE (Q2152043) (← links)
- A new lower bound on the second-order nonlinearity of a class of monomial bent functions (Q2179505) (← links)
- The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications (Q2179518) (← links)
- Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G (Q2205894) (← links)
- A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity (Q2220756) (← links)
- Three classes of balanced vectorial semi-bent functions (Q2243890) (← links)
- An improved degree evaluation method of NFSR-based cryptosystems (Q2243894) (← links)
- A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller code (Q2249793) (← links)
- A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance (Q2277233) (← links)
- Generalization of one method of a filter generator key recovery (Q2322390) (← links)
- Correlation attacks on combination generators (Q2376654) (← links)
- A survey on fast correlation attacks (Q2376656) (← links)
- Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol (Q2384172) (← links)
- Literature survey on nonlinear components and chaotic nonlinear components of block ciphers (Q2441984) (← links)
- Results on multiples of primitive polynomials and their products over GF(2) (Q2566016) (← links)
- Vectorial approach to fast correlation attacks (Q2572957) (← links)
- A discrete logarithm-based approach to compute low-weight multiples of binary polynomials (Q2634391) (← links)
- Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V (Q2673990) (← links)