Advanced

Theoretical analysis of a correlation attack based on convolutional codes

Johansson, Thomas LU and Jönsson, Fredrik LU (2000) IEEE International Symposium on Information Theory (ISIT), 2000 p.212-212
Abstract
The authors consider a binary synchronous stream cipher where a correlation has been identified between the keystream sequence and the output from one of the linear feedback shift registers (LFSR). They present a theoretical analysis of their recent algorithm for fast correlation attacks, based on the use of convolutional codes (see Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol.1592, p.347-62, Springer-Verlag, 1999).
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
[Host publication title missing]
pages
212 - 212
conference name
IEEE International Symposium on Information Theory (ISIT), 2000
conference location
Sorrento, Italy
conference dates
2000-06-25 - 2000-06-30
external identifiers
  • scopus:0034449301
ISBN
0-7803-5857-0
DOI
10.1109/ISIT.2000.866510
language
English
LU publication?
yes
id
b52bf056-2b3f-4c1c-aa68-a30abf2f43e7 (old id 1157770)
alternative location
http://ieeexplore.ieee.org/iel5/6966/18755/00866510.pdf
date added to LUP
2008-06-10 11:22:14
date last changed
2019-01-06 12:02:32
@inproceedings{b52bf056-2b3f-4c1c-aa68-a30abf2f43e7,
  abstract     = {The authors consider a binary synchronous stream cipher where a correlation has been identified between the keystream sequence and the output from one of the linear feedback shift registers (LFSR). They present a theoretical analysis of their recent algorithm for fast correlation attacks, based on the use of convolutional codes (see Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol.1592, p.347-62, Springer-Verlag, 1999).},
  author       = {Johansson, Thomas and Jönsson, Fredrik},
  isbn         = {0-7803-5857-0},
  language     = {eng},
  location     = {Sorrento, Italy},
  pages        = {212--212},
  title        = {Theoretical analysis of a correlation attack based on convolutional codes},
  url          = {http://dx.doi.org/10.1109/ISIT.2000.866510},
  year         = {2000},
}