Advanced

Theoretical analysis of a correlation attack based on convolutional codes

Johansson, Thomas LU and Jönsson, Fredrik LU (2000) IEEE International Symposium on Information Theory (ISIT), 2000 In [Host publication title missing] p.212-212
Abstract
The authors consider a binary synchronous stream cipher where a correlation has been identified between the keystream sequence and the output from one of the linear feedback shift registers (LFSR). They present a theoretical analysis of their recent algorithm for fast correlation attacks, based on the use of convolutional codes (see Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol.1592, p.347-62, Springer-Verlag, 1999).
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
in
[Host publication title missing]
pages
212 - 212
conference name
IEEE International Symposium on Information Theory (ISIT), 2000
external identifiers
  • Scopus:0034449301
ISBN
0-7803-5857-0
DOI
10.1109/ISIT.2000.866510
language
English
LU publication?
yes
id
b52bf056-2b3f-4c1c-aa68-a30abf2f43e7 (old id 1157770)
alternative location
http://ieeexplore.ieee.org/iel5/6966/18755/00866510.pdf
date added to LUP
2008-06-10 11:22:14
date last changed
2016-10-13 04:58:32
@misc{b52bf056-2b3f-4c1c-aa68-a30abf2f43e7,
  abstract     = {The authors consider a binary synchronous stream cipher where a correlation has been identified between the keystream sequence and the output from one of the linear feedback shift registers (LFSR). They present a theoretical analysis of their recent algorithm for fast correlation attacks, based on the use of convolutional codes (see Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol.1592, p.347-62, Springer-Verlag, 1999).},
  author       = {Johansson, Thomas and Jönsson, Fredrik},
  isbn         = {0-7803-5857-0},
  language     = {eng},
  pages        = {212--212},
  series       = {[Host publication title missing]},
  title        = {Theoretical analysis of a correlation attack based on convolutional codes},
  url          = {http://dx.doi.org/10.1109/ISIT.2000.866510},
  year         = {2000},
}