Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
A fast correlation attack on LILI-128
Information Processing Letters
A Practical Cryptanalysis of SSC2
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks through Reconstruction of Linear Polynomials
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions
Proceedings of the 7th IMA International Conference on Cryptography and Coding
Cryptanalysis of the "Grain" family of stream ciphers
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Cryptanalysis of Achterbahn-version 1 and -version 2
Journal of Computer Science and Technology
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
New Stream Cipher Designs
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Design and analysis of a highly secure stream cipher based on linear feedback shift register
Computers and Electrical Engineering
Linear feedback shift register based stream ciphers
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
When stream cipher analysis meets public-key cryptography
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
On the number of equivalence classes in certain stream ciphers
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
TCHo: a hardware-oriented trapdoor cipher
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Attacking the filter generator by finding zero inputs of the filtering function
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Nonlinear equivalence of stream ciphers
FSE'10 Proceedings of the 17th international conference on Fast software encryption
On the link of some semi-bent functions with Kloosterman sums
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
An efficient, parameterized and scalable S-box for stream ciphers
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
A note on fast algebraic attacks and higher order nonlinearities
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
On equivalence classes of boolean functions
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
A new simple technique to attack filter generators and related ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
A new distinguisher for clock controlled stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Some attacks on the bit-search generator
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A new criterion for nonlinearity of block ciphers
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Correlation attacks on combination generators
Cryptography and Communications
Semi-bent functions with multiple trace terms and hyperelliptic curves
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Designs, Codes and Cryptography
A new method to construct Boolean functions with good cryptographic properties
Information Processing Letters
Hi-index | 0.00 |
A common type of running key generator employed in stream cipher systems consists of n (mostly maximum-length) binary linear feedback shift registers (LFSR's) whose output sequences are combined by a nonlinear Boolean function f. The output of several combining functions previously proposed in the literature is known to be correlated to some input variables with probabilities p up to 0.75 (this holds, e.g. for the generators of Geffe, Pless, or Bruer). These generators have been broken in [2] for LFSR-lengths k