Theoretical analysis of a correlation attack based on convolutional codes
(2000) IEEE International Symposium on Information Theory (ISIT), 2000 p.212-212- Abstract
- The authors consider a binary synchronous stream cipher where a correlation has been identified between the keystream sequence and the output from one of the linear feedback shift registers (LFSR). They present a theoretical analysis of their recent algorithm for fast correlation attacks, based on the use of convolutional codes (see Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol.1592, p.347-62, Springer-Verlag, 1999).
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/1157770
- author
- Johansson, Thomas
LU
and Jönsson, Fredrik LU
- organization
- publishing date
- 2000
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- [Host publication title missing]
- pages
- 212 - 212
- conference name
- IEEE International Symposium on Information Theory (ISIT), 2000
- conference location
- Sorrento, Italy
- conference dates
- 2000-06-25 - 2000-06-30
- external identifiers
-
- scopus:0034449301
- ISBN
- 0-7803-5857-0
- DOI
- 10.1109/ISIT.2000.866510
- language
- English
- LU publication?
- yes
- id
- b52bf056-2b3f-4c1c-aa68-a30abf2f43e7 (old id 1157770)
- alternative location
- http://ieeexplore.ieee.org/iel5/6966/18755/00866510.pdf
- date added to LUP
- 2016-04-04 13:54:47
- date last changed
- 2023-09-06 18:57:14
@inproceedings{b52bf056-2b3f-4c1c-aa68-a30abf2f43e7, abstract = {{The authors consider a binary synchronous stream cipher where a correlation has been identified between the keystream sequence and the output from one of the linear feedback shift registers (LFSR). They present a theoretical analysis of their recent algorithm for fast correlation attacks, based on the use of convolutional codes (see Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, vol.1592, p.347-62, Springer-Verlag, 1999).}}, author = {{Johansson, Thomas and Jönsson, Fredrik}}, booktitle = {{[Host publication title missing]}}, isbn = {{0-7803-5857-0}}, language = {{eng}}, pages = {{212--212}}, title = {{Theoretical analysis of a correlation attack based on convolutional codes}}, url = {{http://dx.doi.org/10.1109/ISIT.2000.866510}}, doi = {{10.1109/ISIT.2000.866510}}, year = {{2000}}, }