Fast correlation attacks on stream ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fundamentals of Convolutional Coding
Fundamentals of Convolutional Coding
A method for finding codewords of small weight
Proceedings of the 3rd International Colloquium on Coding Theory and Applications
A Comparison of Fast Correlation Attacks
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the Third International Workshop on Fast Software Encryption
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
A fast correlation attack on LILI-128
Information Processing Letters
A Practical Cryptanalysis of SSC2
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks through Reconstruction of Linear Polynomials
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Correlation Analysis of the Shrinking Generator
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Decimation Attack of Stream Ciphers
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Fast Correlation Attack Algorithm with List Decoding and an Application
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A New Ultrafast Stream Cipher Design: COS Ciphers
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Cryptanalysis of Stream Ciphers with Linear Masking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Correlation Analysis of the Alternating Step Generator
Designs, Codes and Cryptography
Journal of Complexity - Special issue on coding and cryptography
Vectorial Approach to Fast Correlation Attacks
Designs, Codes and Cryptography
Concatenating Indicators of Flats for Designing Cryptographic Functions
Designs, Codes and Cryptography
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
Modified clock-controlled alternating step generators
Computer Communications
Security Analysis of a Variant of Self-Shrinking Generator
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On guess and determine cryptanalysis of LFSR-based stream ciphers
IEEE Transactions on Information Theory
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Propagation characteristics and correlation-immunity of highly nonlinear boolean functions
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Multi-pass fast correlation attack on stream ciphers
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
When stream cipher analysis meets public-key cryptography
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Clock-controlled shrinking generator of feedback shift registers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
On the number of equivalence classes in certain stream ciphers
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
On a resynchronization weakness in a class of combiners with memory
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Region based QIM digital watermarking scheme for image database in DCT domain
Computers and Electrical Engineering
An efficient, parameterized and scalable S-box for stream ciphers
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
New guess-and-determine attack on the self-shrinking generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
On the rate of coincidence of two clock-controlled combiners
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
A new simple technique to attack filter generators and related ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A new distinguisher for clock controlled stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
A fast correlation attack on the shrinking generator
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
The conditional correlation attack: a practical attack on bluetooth encryption
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Correlation attacks on combination generators
Cryptography and Communications
A survey on fast correlation attacks
Cryptography and Communications
On the algebraic attack against summation type keystream generators
International Journal of Information and Computer Security
Hi-index | 0.06 |
This paper describes new methods for fast correlation attacks, based on the theory of convolutional codes. They can be applied to arbitrary LFSR feedback polynomials, in opposite to the previous methods, which mainly focus on feedback polynomials of low weight. The results improve significantly the few previous results for this general case, and are in many cases comparable with corresponding results for low weight feedback polynomials.