Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,212 papers from all fields of science
Search
Sign In
Create Free Account
Correlation attack
Known as:
Correlation attacks
In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Balanced boolean function
Bent function
Content Scramble System
Correlation immunity
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A new countermeasure against side-channel attacks based on hardware-software co-design
Ruben Lumbiarres-Lopez
,
Mariano López-García
,
E. Cantó
Microprocessors and microsystems
2016
Corpus ID: 206934374
2010
2010
Some Results on the Degenerate Criterion of Cryptographic Functions over Finite Fields
Jihong Teng
,
Xiaoying Huang
,
Weiming Zhang
International Conference on Multimedia…
2010
Corpus ID: 15502729
The paper reveals the relationship between degenerate criterion and Chrestenson spectra of cryptographic functions over finite…
Expand
Review
2009
Review
2009
Cache Timing Analysis of eStream Finalists
E. Zenner
Symmetric Cryptography
2009
Corpus ID: 20891273
Cache Timing Attacks have attracted a lot of cryptographic attention due to their relevance for the AES. However, their…
Expand
2009
2009
Design and analysis of a highly secure stream cipher based on linear feedback shift register
P. Deepthi
,
Deepa Sara John
,
P. S. Sathidevi
Computers & electrical engineering
2009
Corpus ID: 41856813
Highly Cited
2004
Highly Cited
2004
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
J. Golic
,
M. Mihaljević
Journal of Cryptology
2004
Corpus ID: 34645915
A statistical approach to cryptanalysis of a memoryless function of clock-controlled shift registers is introduced. In the case…
Expand
2004
2004
Correlation Attacks Using a New Class of Weak Feedback Polynomials
Håkan Englund
,
Martin Hell
,
T. Johansson
Fast Software Encryption Workshop
2004
Corpus ID: 15197719
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and…
Expand
2002
2002
Correlation properties of an improved summation generator with 2-bit memory
Chi-Kwong Chan
,
Lee-Ming Cheng
Signal Processing
2002
Corpus ID: 23561839
1997
1997
Edit Distance Correlation Attack on the Alternating Step Generator
J. Golic
,
R. Menicocci
Annual International Cryptology Conference
1997
Corpus ID: 28312705
A novel edit distance between two binary input strings and one binary output string of appropriate lengths which incorporates the…
Expand
1995
1995
Discrete Optimisation and Fast Correlation Attacks
J. Golic
,
M. Salmasizadeh
,
A. Clark
,
A. Khodkar
,
E. Dawson
Cryptography: Policy and Algorithms
1995
Corpus ID: 15150832
Modifications to fast correlation attacks on stream ciphers are investigated. Improvements are achieved with both deterministic…
Expand
1995
1995
Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers
W. T. Penzhorn
,
G. J. Kühn
IMA Conference on Cryptography and Coding
1995
Corpus ID: 13687751
Abs t r ac t . The fast correlation attack described by Meier and StatTelbach [1] on certain stream ciphers requires that the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE