Analysis and design of stream ciphers
Analysis and design of stream ciphers
Cryptanalysts representation of nonlinearly filtered ML-sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
On the linear syndrome method in cryptoanalysis
CRYPTO '88 Proceedings on Advances in cryptology
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A fast correlation attack on nonlinearly feedforward filtered shift-register sequences
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Correlation properties of combiners with memory in stream ciphers
Journal of Cryptology - Eurocrypt '90
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Error-Correction Coding for Digital Communications
Error-Correction Coding for Digital Communications
Low Order Approximation of Cipher Functions
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Discrete Optimisation and Fast Correlation Attacks
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
Vectorial Approach to Fast Correlation Attacks
Designs, Codes and Cryptography
On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
On the lower bounds of the second order nonlinearities of some Boolean functions
Information Sciences: an International Journal
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Constructions of cryptographically significant boolean functions using primitive polynomials
IEEE Transactions on Information Theory
A note on fast algebraic attacks and higher order nonlinearities
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
On the higher order nonlinearities of algebraic immune functions
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
On Second-order Nonlinearities of Some D 0 Type Bent Functions
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Hi-index | 0.06 |
A fast and efficient procedure for finding low order approximations to large boolean functions, if such approximations exist, is developed. The procedure uses iterative error-correction algorithms for fast correlation attacks on certain stream ciphers and is based on representing low order boolean functions by appropriate linear recurring sequences generated by binary filter generators. Applications and significance of the proposed method in thc analysis and design of block and stream ciphers are also discussed.