Analysis and design of stream ciphers
Analysis and design of stream ciphers
Cryptanalysts representation of nonlinearly filtered ML-sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
On the Security of Nonlinear Filter Generators
Proceedings of the Third International Workshop on Fast Software Encryption
On Nonlinear Filter Generators
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
New applications of time memory data tradeoffs
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Cryptanalysis of the stream cipher DECIM
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
New Stream Cipher Designs
Cryptography and Communications
Hi-index | 0.00 |
Correlation-immunity is a cryptographic criterion on Boolean functions arising fromcorrelation attacks on combining functions. When it comes to filtering functions, the status of correlation-immunity lacks study in itself and, if it is commonly accepted as a requirement for nonlinear filter generators, this is for other concerns.We revisit the concept of correlation-immunity and clear up its meaning for filtering functions. We summarize existing criteria similar to correlation-immunity and attacks in two different models, showing that such criteria are not relevant in both models.We also derive a precise property to avoid correlations due to the filter function only, which appears to be a bit looser than correlation-immunity.We then propose new attacks based on whether this property is verified.