Correlation attack

Known as: Correlation attacks 
In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of… (More)
  • table 1
  • table 2
  • figure 2
  • figure 3
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
A new approach to attack A5/1 is proposed. The proposed attack is a refinement of a previous attack by Ekdahl and Johansson. We… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Many stream ciphers are built of a linear sequence generator and a non-linear output function f. There is abundant literature on… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The task of a fast correlation attack is to efficiently restore the initial content of a linear feedback shift register in a… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper describes new techniques for fast correlation attacks, based on Gallager iterative decoding algorithm using parity… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper describes new methods for fast correlation attacks, based on the theory of convolutional codes. They can be applied to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Suppose that the output of a running key generator employed in a stream cipher is correlated to a linear feedback shift register… (More)
Is this relevant?