期刊文献+

Algebraic attacks on two kinds of special nonlinear filter generators

Algebraic attacks on two kinds of special nonlinear filter generators
下载PDF
导出
出处 《High Technology Letters》 EI CAS 2012年第2期151-154,共4页 高技术通讯(英文版)
基金 Supported by the National Basic Research Program of China (No. 2007CB311201), the National Natural Science Foundation of China (No.60833008 No.60803149), and the Foundation of Guangxi Key Laboratory of Information and Communication (No.20902).
关键词 代数攻击 非线性滤波 发电机 线性反馈移位寄存器 布尔函数 LFSR 过滤功能 代数关系 stream cipher, linear feedback shift register (LFSR), Boolean function, algebraic attack, cryptanalysis
  • 相关文献

参考文献19

  • 1Rueppel R A. Analysis and Design of Stream Ciphers, Berlin: Springer, 1986.
  • 2Golomb S W, Gong G. Signal Design for Good correlation. London Cambridge Press, 2005.81-113.
  • 3~ Bracken A. Clyptographic Properties of Boolean Functions and S- boxes. Belgium: Leuven University, 2006.
  • 4Forre R. A fast correlation attack on nonlinearly feedforward filtered shift-register sequences. In: Proceedings of the Workshop on the Theory and Application of Cryptographie Techniques on Advances in Cryptology, 1989, Houthalen, Belgium, 1990. 586- 595.
  • 5Bracken A, I_ano J. On the (Ira)Possibility of practical and secure nonlinear filters and combiners. In: Proceedings of the 12th International Workshop on Selected Areas in Cryptography 2005, Kingston, Canada, 2006. 159-174.
  • 6linear feedback. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques 2003, Warsaw, Poland, 2003.345-359.
  • 7Courtois N T. Fast algebraic attacks on stream ciphers with linear feedback. In: Proceedings of the 23rd Annual International Cryptology Conference 2003, Santa Barbara, USA. 2003. 176- 194.
  • 8Ronjom S, Hellseseth T. A new attack on the filter generator. IEEE Transactions on Information Theory, 2007, 53(5):1752- 1758.
  • 9Agreu M, Johansson T, Hell M, Ira_proving the rainbow attack by reusing colours. In: Proceedings of the 8th International Conference on Cryptology and Network Security, Kanazawa, Japan, 2009, 362-378.
  • 10Golic J D, Morgari G. Optimal correlation attack on the multiplexer generator. Information Processing Letters, 2009, 109:838-841.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部