Transform Domain Analysis of Sequences

@article{Khan2015TransformDA,
  title={Transform Domain Analysis of Sequences},
  author={Muhammad Asad Khan and Amir Ali Khan and Fauzan Mirza},
  journal={ArXiv},
  year={2015},
  volume={abs/1503.00943}
}
In cryptanalysis, security of ciphers vis-a-vis attacks is gauged against three criteria of complexities, i.e., computations, memory and time. Some features may not be so apparent in a particular domain, and their analysis in a transformed domain often reveals interesting patterns. Moreover, the complexity criteria in different domains are different and performance improvements are often achieved by transforming the problem in an alternate domain. Owing to the results of coding theory and… CONTINUE READING
2
Twitter Mentions

Similar Papers

Citations

Publications citing this paper.

Design of a New Stream Cipher: PARS

VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 25 REFERENCES

Fast Discrete Fourier Spectra Attacks on Stream Ciphers

  • IEEE Transactions on Information Theory
  • 2011
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Stream cipher. Encyclopedia of Cryptography and Security, pages 1263–1265

Anne Canteaut
  • 2011
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Stream Cipher

  • Encyclopedia of Cryptography and Security
  • 2011

A New Attack on the Filter Generator

  • IEEE Transactions on Information Theory
  • 2007
VIEW 1 EXCERPT

Conditional Estimators: An Effective Attack on A5/1

  • Selected Areas in Cryptography
  • 2005
VIEW 1 EXCERPT