Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
On the linear syndrome method in cryptoanalysis
CRYPTO '88 Proceedings on Advances in cryptology
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Pseudorandom Bit Generators in Stream-Cipher Cryptography
Computer - Special issue on cryptography
Linear Models for Keystream Generators
IEEE Transactions on Computers
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A New Ultrafast Stream Cipher Design: COS Ciphers
Proceedings of the 8th IMA International Conference on Cryptography and Coding
The editing generator and its cryptanalysis
International Journal of Wireless and Mobile Computing
Random Fault Attack against Shrinking Generator
Algorithmic Aspects of Wireless Sensor Networks
A comparison of cryptanalytic principles based on iterative error-correction
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Fast correlation attacks: methods and countermeasures
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Fault cryptanalysis and the shrinking generator
WEA'06 Proceedings of the 5th international conference on Experimental Algorithms
Algebraic attacks on clock-controlled stream ciphers
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
A new algorithm is developed for making attacks to certain comparatively simple LFSR based ciphersystems. Special attention is paid towards minimizing the solution distance and guaranteeing the success probability of the attacks. The algorithm is then applied to crack the random bit generators of Geffe (1973) and Beth-Piper (1984).