Fast correlation attacks on stream ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A new class of nonlinear functions for running-key generators
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Lock-in effect in cascades of clock-controlled shift-registers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Properties of binary functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A noisy clock-controlled shift register cryptanalysis concept based on sequence comparison approach
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Blind synchronization of m-sequences with even span
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Enumeration of Correlation Immune Boolean Functions
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Brief Outline of Research on Correlation Immune Functions
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
The LILI-II Keystream Generator
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Primitive Polynomials over GF(2) - A Cryptologic Approach
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Linear Codes in Constructing Resilient Functions with High Nonlinearity
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Multiples of Primitive Polynomials and Their Products over GF(2)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks through Reconstruction of Linear Polynomials
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Correlation Immunity and the Summation Generator
CRYPTO '85 Advances in Cryptology
Decimation Attack of Stream Ciphers
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Fast Correlation Attacks: An Algorithmic Point of View
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On Resilient Boolean Functions with Maximal Possible Nonlinearity
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
An Upper Bound on the Number of m-Resilient Boolean Functions
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Software-Oriented Stream Cipher SSC2
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Fast Correlation Attack Algorithm with List Decoding and an Application
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions
Proceedings of the 7th IMA International Conference on Cryptography and Coding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A New Ultrafast Stream Cipher Design: COS Ciphers
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Linear Slide Attacks on the KeeLoq Block Cipher
Information Security and Cryptology
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Fast Software Encryption
On Reconstruction of RC4 Keys from Internal States
Mathematical Methods in Computer Science
Optimal correlation attack on the multiplexer generator
Information Processing Letters
On guess and determine cryptanalysis of LFSR-based stream ciphers
IEEE Transactions on Information Theory
Tandem coding and cryptography on wiretap channels: EXIT chart analysis
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Computing the biases of parity-check relations
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Discrete Applied Mathematics - Special issue: Coding and cryptography
On the existence of secure feedback registers
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Fast low order approximation of cryptographic functions
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
On a fast correlation attack on certain stream ciphers
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A comparison of cryptanalytic principles based on iterative error-correction
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Correlation VIA linear sequential circuit approximation of combiners with memory
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Some remarks on the cross correlation analysis of pseudo random generators
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Construction of nonlinear boolean functions with important cryptographic properties
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Propagation characteristics and correlation-immunity of highly nonlinear boolean functions
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Multi-pass fast correlation attack on stream ciphers
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
New constructions for resilient and highly nonlinear boolean functions
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
On the number of equivalence classes in certain stream ciphers
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
On a resynchronization weakness in a class of combiners with memory
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Attacking the filter generator by finding zero inputs of the filtering function
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
A geometrical robust image data hiding scheme using FCA-based resynchronization
IH'07 Proceedings of the 9th international conference on Information hiding
Revisiting correlation-immunity in filter generators
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Physical-layer security: combining error control coding and cryptography
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Equivalence classes of Boolean functions for first-order correlation
IEEE Transactions on Information Theory
Fast correlation attacks: methods and countermeasures
FSE'11 Proceedings of the 18th international conference on Fast software encryption
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
New cryptographic applications of boolean function equivalence classes
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Cryptography and Communications
The conditional correlation attack: a practical attack on bluetooth encryption
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
On boolean functions with generalized cryptographic properties
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Security of jump controlled sequence generators for stream ciphers
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
The rainbow attack on stream ciphers based on maiorana-mcfarland functions
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Probabilistic algebraic attacks
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Conditional estimators: an effective attack on A5/1
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Linear Complexity of Generalized Cyclotomic Binary Sequences of Order 2
Finite Fields and Their Applications
Generalized correlation analysis of Vectorial Boolean functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Correlation attacks on combination generators
Cryptography and Communications
A survey on fast correlation attacks
Cryptography and Communications
On the algebraic attack against summation type keystream generators
International Journal of Information and Computer Security
Improved key recovery attacks on reduced-round salsa20 and chacha
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
A new model for error-tolerant side-channel cube attacks
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 15.10 |
Pseudonoise sequences generated by linear feedback shift registers [1] with some nonlinear combining function have been proposed [2]-[5] for cryptographic applications as running key generators in stream ciphers. In this correspondence it will be shown that the number of trials to break these ciphers can be significantly reduced by using correlation methods. By comparison of computer simulations and theoretical results based on a statistical model, the validity of this analysis is demonstrated. Rubin [6] has shown that it is computationally feasible to solve a cipher proposed by Pless [2] in a known plaintext attack, using as few as 15 characters. Here, the number of ciphertext symbols is determined to perform a ciphertext-only attack on the Pless cipher using the correlation attack. Our conclusion from the analysis is that the pseudonoise generator's output sequence and the sequences generated by the linear feedback shift registers should be uncorrelated. This leads to constraints for the nonlinear combining function to be used.