DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mihaljević, Miodrag J. | en_US |
dc.contributor.author | Fossorier, Marc P. C. | en_US |
dc.contributor.author | Imai, Hideki | en_US |
dc.date.accessioned | 2020-03-05T20:28:22Z | - |
dc.date.available | 2020-03-05T20:28:22Z | - |
dc.date.issued | 2006-01-01 | - |
dc.identifier.isbn | 978-3-540-31424-0 | - |
dc.identifier.issn | 0302-9743 | en |
dc.identifier.uri | http://researchrepository.mi.sanu.ac.rs/handle/123456789/114 | - |
dc.description.abstract | This paper proposes a novel approach for cryptanalysis of certain cryptographic pseudorandom sequence (keystream) generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis based on the following: Suppose certain B bits of the LFSM initial state as known and identify time instances where certain arguments of the nonlinear function depend only on these B bits and are equal to zero. As opposed to previously reported methods, the proposed one also identifies and uses certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system of overdefined equations employed in an algebraic attack scenario, or to reduce the noise introduced by the linearization of the nonlinear function which corrupts the linear equations employed in a correlation attack scenario. | en_US |
dc.publisher | Springer Link | en_US |
dc.relation | Advanced methods for cryptology and information processing | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_US |
dc.subject | Algebraic attacks | Cryptanalysis | Decimation | Decoding | Fast correlation attack | Keystream generators | LFSRs | Overdefined systems of nonlinear equations | State transition matrix | Stream ciphers | en_US |
dc.title | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1007/11617983_20 | - |
dc.identifier.scopus | 2-s2.0-33745666500 | - |
dc.contributor.affiliation | Mathematical Institute of the Serbian Academy of Sciences and Arts | en_US |
dc.relation.firstpage | 203 | en |
dc.relation.lastpage | 214 | en |
dc.relation.volume | 3857 LNCS | en |
dc.description.rank | M23 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Article | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.project.projectURL | http://www.mi.sanu.ac.rs/projects/144018e.htm | - |
crisitem.author.orcid | 0000-0003-3047-3020 | - |
SCOPUSTM
Citations
11
checked on Nov 24, 2024
Page view(s)
18
checked on Nov 24, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.