Skip to search formSkip to main contentSkip to account menu

Correlation attack

Known as: Correlation attacks 
In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
  • 2017
  • Corpus ID: 8937968
A few lightweight stream ciphers were introduced for hardware applications in the eSTREAM project. In FSE 2015, while presenting… 
2015
2015
The rapid technology upgrades of mobile devices and the popularity of wireless networks significantly drive the emergence and… 
2013
2013
Today Radio Frequency Identification (RFID) technologies are applied in many fields for a variety of applications. Though… 
2010
2010
The paper reveals the relationship between degenerate criterion and Chrestenson spectra of cryptographic functions over finite… 
2008
2008
We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM… 
2008
2008
ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is… 
2007
2007
In this paper, a general framework which enables to compare previously proposed block decoding approaches for the fast… 
Review
2005
Review
2005
In this report, a survey on cryptanalysis of stream cipher is presented. For each signi cant method, a brief outline is provided… 
2005
2005
A recent key-recovery attack on Pomaranch stream cipher was built due to the spotted biases in the distribution of certain linear… 
1996
1996
A concept of constrained many-to-one string edit distances, with or without memory, based on edit operations of deletion and…