A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
- 1 January 1991
- journal article
- Published by Springer Nature in Journal of Cryptology
- Vol. 3 (3) , 201-212
- https://doi.org/10.1007/bf00196912
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequencePublished by Springer Nature ,2005
- Fast correlation attacks on certain stream ciphersJournal of Cryptology, 1989
- Clock-controlled shift registers: a reviewIEEE Journal on Selected Areas in Communications, 1989
- On the linear complexity of functions of periodic GF(q) sequencesIEEE Transactions on Information Theory, 1989
- Recognition of Noisy Subsequences Using Constrained Edit DistancesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Constrained string editingInformation Sciences, 1986
- Decrypting a Class of Stream Ciphers Using Ciphertext OnlyIEEE Transactions on Computers, 1985
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)IEEE Transactions on Information Theory, 1984
- Longest common subsequences of two random sequencesJournal of Applied Probability, 1975