Searching for the optimum correlation attack
- 1 January 1995
- book chapter
- Published by Springer Nature
- p. 137-143
- https://doi.org/10.1007/3-540-60590-8_11
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Cryptanalysts Representation of Nonlinearly Filtered ML-SequencesPublished by Springer Nature ,2007
- A Fast Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register SequencesPublished by Springer Nature ,2001
- Nonlinearity Criteria for Cryptographic FunctionsPublished by Springer Nature ,2001
- Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift Register SequencePublished by Springer Nature ,2001
- Correlation Via Linear Sequential Circuit Approximation of Combiners with MemoryPublished by Springer Nature ,2001
- Why cryptosystems failCommunications of the ACM, 1994
- TREE FUNCTIONS AND CIPHER SYSTEMSCryptologia, 1991
- Fast correlation attacks on certain stream ciphersJournal of Cryptology, 1989
- A spectral characterization of correlation-immune combining functionsIEEE Transactions on Information Theory, 1988
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)IEEE Transactions on Information Theory, 1984