Sciweavers

7 search results - page 1 / 2
» Reducing the Space Complexity of BDD-Based Attacks on Keystr...
Sort
View
FSE
2006
Springer
99views Cryptology» more  FSE 2006»
15 years 8 months ago
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
The main application of stream ciphers is online-encryption of arbitrarily long data, for example when transmitting speech data between a Bluetooth headset and a mobile GSM phone o...
Matthias Krause, Dirk Stegemann
WAIFI
2007
Springer
175views Mathematics» more  WAIFI 2007»
15 years 11 months ago
Attacking the Filter Generator over GF (2 m )
We consider the filter generator over GF(2m ) consisting of a linear feedback shift register of length k that generates a maximal length linear sequence of period 2mk − 1 over G...
Sondre Rønjom, Tor Helleseth
129
Voted
FSE
2005
Springer
84views Cryptology» more  FSE 2005»
15 years 10 months ago
Some Attacks on the Bit-Search Generator
The bit-search generator (BSG) was proposed in 2004 and can be seen as a variant of the shrinking and self-shrinking generators. It has the advantage that it works at rate 1/3 usin...
Martin Hell, Thomas Johansson
133
Voted
JOC
2008
92views more  JOC 2008»
15 years 5 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois