Fast correlation attacks on certain stream ciphers
Journal of Cryptology
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
Blind synchronization of m-sequences with even span
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A Practical Cryptanalysis of SSC2
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks through Reconstruction of Linear Polynomials
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Decimation Attack of Stream Ciphers
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
The Correlation of a Boolean Function with Its Variables
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Linear Cryptanalysis of Bluetooth Stream Cipher
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A comparison of cryptanalytic principles based on iterative error-correction
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A new stream cipher using two nonlinear functions
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
A survey on fast correlation attacks
Cryptography and Communications
Hi-index | 0.00 |
In this paper we present a new algorithm for the recovery of the initial state of a linear feedback shift register when a noisy output sequence is given. Our work is focussed on the investigation of the asymptotical behaviour of the recovery process rather than on the construction of an optimal recovery procedure. Our results show the importance of low-weight checks and show also that the complexity of the recovery problem grows less than exponentially with the length of the shift register, even if the number of taps grows linearly with the register length. Our procedure works for shift register with arbitrary feedback polynomial.