Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Correlation attack

Known as: Correlation attacks 
In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), which contain both secret variables (e.g… Expand
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Signature based intrusion detection systems cannot detect new attacks. These systems are the most used and developed ones… Expand
  • table II
  • table III
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Suppose that the output of a running key generator employed in a stream cipher is correlated to a linear feedback shift register… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Many stream ciphers are built of a linear sequence generator and a non-linear output function f. There is an abundant literature… Expand
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1984
Highly Cited
1984
Pseudonoise generators for cryptographic applications consisting of several linear feedback shift registers with a nonlinear… Expand
Is this relevant?