Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,435,358 papers from all fields of science
Search
Sign In
Create Free Account
Correlation attack
Known as:
Correlation attacks
In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Balanced boolean function
Bent function
Content Scramble System
Correlation immunity
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
2 Fruit : Ultra-Lightweight Stream Cipher with Shorter Internal State it
2017
Corpus ID: 8937968
A few lightweight stream ciphers were introduced for hardware applications in the eSTREAM project. In FSE 2015, while presenting…
Expand
2015
2015
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems
C. Li
,
Balaji Palanisamy
International Conference on Network and System…
2015
Corpus ID: 26894394
The rapid technology upgrades of mobile devices and the popularity of wireless networks significantly drive the emergence and…
Expand
2013
2013
Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel
Kazuya Sakai
,
Wei-Shinn Ku
,
Roger Zimmermann
,
Min-Te Sun
IEEE transactions on computers
2013
Corpus ID: 2534256
Today Radio Frequency Identification (RFID) technologies are applied in many fields for a variety of applications. Though…
Expand
2010
2010
Some Results on the Degenerate Criterion of Cryptographic Functions over Finite Fields
Jihong Teng
,
Xiaoying Huang
,
Weiming Zhang
International Conference on Multimedia…
2010
Corpus ID: 15502729
The paper reveals the relationship between degenerate criterion and Chrestenson spectra of cryptographic functions over finite…
Expand
2008
2008
Yet Another Attack on Vest
Pascal Delaunay
,
A. Joux
International Conference on Cryptology in Africa
2008
Corpus ID: 14456034
We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM…
Expand
2008
2008
Fast correlation attack on stream cipher ABC v3
Haina Zhang
,
Lin Li
,
Xiaoyun Wang
Science in China Series F: Information Sciences
2008
Corpus ID: 14786922
ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is…
Expand
2007
2007
Modeling Block Decoding Approaches for the Fast Correlation Attack
M. Fossorier
,
M. Mihaljević
,
H. Imai
IEEE Transactions on Information Theory
2007
Corpus ID: 1166432
In this paper, a general framework which enables to compare previously proposed block decoding approaches for the fast…
Expand
Review
2005
Review
2005
CRYPTANALYSIS OF STREAM CIPHER|A SURVEY
Shaoquan Jiang
,
G. Gong
2005
Corpus ID: 51987883
In this report, a survey on cryptanalysis of stream cipher is presented. For each signi cant method, a brief outline is provided…
Expand
2005
2005
Countering the Correlation Attack on Pomaranch
Cees J. A. Jansen
,
A. Kholosha
2005
Corpus ID: 6542256
A recent key-recovery attack on Pomaranch stream cipher was built due to the spotted biases in the distribution of certain linear…
Expand
1996
1996
Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators
J. Golic
,
Slobodan V. Petrovic
IEEE Trans. Computers
1996
Corpus ID: 21169917
A concept of constrained many-to-one string edit distances, with or without memory, based on edit operations of deletion and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE