On Correlation-Immune Functions
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Algebraic degree of the inverse of linearized polynomials
Journal of Symbolic Computation
Rotation symmetric Boolean functions-Count and cryptographic properties
Discrete Applied Mathematics
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
Design and analysis of a highly secure stream cipher based on linear feedback shift register
Computers and Electrical Engineering
Modified clock-controlled alternating step generators
Computer Communications
High speed true random number generator based on open loop structures in FPGAs
Microelectronics Journal
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Discrete Applied Mathematics - Special issue: Coding and cryptography
Construction of high degree resilient S-boxes with improved nonlinearity
Information Processing Letters
Boolean functions optimizing most of the cryptographic criteria
Discrete Applied Mathematics
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity
Security and Communication Networks
p-Ary and q-ary versions of certain results about bent functions and resilient functions
Finite Fields and Their Applications
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
Finite Fields and Their Applications
Correlation attacks on combination generators
Cryptography and Communications
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
On the algebraic attack against summation type keystream generators
International Journal of Information and Computer Security
Secondary constructions of Boolean functions with maximum algebraic immunity
Cryptography and Communications
Optimal parameters for the WG stream cipher family
Cryptography and Communications
Hi-index | 754.84 |
Pseudonoise generators for cryptographic applications consisting of several linear feedback shift registers with a nonlinear combining function have been proposed as running key generators in stream ciphers. These running key generators eau sometimes be broken by (ciphertext-only) correlation attacks on individual subsequences. A new class of combining functions is presented, which provides better security against such attacks. The security is quantified by the smallest numberm + 1of subsequences that must be simultaneously considered in a correlation attack. A necessary condition for suchmth-order correlation-immunity is proved. A recursive construction is given that permits the construction of anmth-order immune combining function fornsubsequences for anymandnwith1 leq m < n. Finally, the trade-off between the length of the linear equivalent of the nonlinear generator and the ordermof its immunity against correlation attacks is considered.