Skip to main content

Fast Correlation Attack

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 154 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Anderson, R.J. (1995). “Searching for the optimum correlation attack.” Fast Software Encryption 1994, Lecture Notes in Computer Science, vol. 1008, ed. B. Preneel. Springer-Verlag, Berlin, 137–143.

    Google Scholar 

  2. Canteaut, A. and E. Filiol (2002). “On the influence of the filtering function on the performance of fast correlation attacks on filter generators.” Symposium on Information Theory in the Benelux, May 2002.

    Google Scholar 

  3. Canteaut, A. and M. Trabbia (2000). “Improved fast correlation attacks using parity-check equations of weight 4 and 5.” Advances in Cryptology—EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, ed. B. Preneel. Springer-Verlag, Berlin, 573–588.

    Google Scholar 

  4. Chepyshov, V., T. Johansson, and B. Smeets (2000). “A simple algorithm for fast correlation attacks on stream ciphers.” Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, ed. B. Schneier. Springer-Verlag, Berlin, 181–195.

    Google Scholar 

  5. Golić, J.Dj. (1996). “On the security of nonlinear filter generators.” Fast Software Encryption 1996, Lecture Notes in Computer Science, vol. 1039, ed. D. Gollman. Springer-Verlag, Berlin, 173–188.

    Google Scholar 

  6. Johansson, T. and F. Jönsson (1999). “Improved fast correlation attack on stream ciphers via convolutional codes.” Advances in Cryptology—EUROCRYPT'99, Lecture Notes in Computer Science, vol. 1592, ed. J. Stern. Springer-Verlag, Berlin, 347–362.

    Google Scholar 

  7. Johansson, T. and F. Jönsson (1999). “Fast correlation attacks based on turbo code techniques.” Advances in Cryptology—CRYPTO'99, Lecture Notes in Computer Science, vol. 1666, ed. J. Wiener. Springer-Verlag, Berlin, 181–197.

    Google Scholar 

  8. Johansson, T. and F. Jönsson (2000). “Fast correlation attacks through reconstruction of linear polynomials.” Advances in Cryptology—CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, ed. M. Bellare. Springer-Verlag, Berlin, 300–315.

    Google Scholar 

  9. Jönsson, F. (2002). “Some results on fast correlation attacks.” PhD Thesis, University of Lund, Sweden.

    Google Scholar 

  10. Jönsson, F. and T. Johansson (2002). “A fast correlation attack on LILI-128.” Information Processing Letters, 81 (3), 127–132.

    Article  MATH  MathSciNet  Google Scholar 

  11. Lee, S., S. Chee, S. Park, and S. Park (1996). “Conditional correlation attack on nonlinear filter generators.” Advances in Cryptography—ASIACRYPT'96, Lecture Notes in Computer Science, vol. 1163, eds. K. Kim and T. Matsumoto. Springer-Verlag, Berlin, 360–367.

    Google Scholar 

  12. Meier, W. and O. Staffelbach (1988). “Fast correlation attacks on stream ciphers.” Advances in Cryptology—EUROCRYPT'88, Lecture Notes in Computer Science, vol. 330, ed. C.G. Günther. Springer-Verlag, Berlin, 301–314.

    Google Scholar 

  13. Meier, W. and O. Staffelbach (1989). “Fast correlation attack on certain stream ciphers.” J. Cryptology, 1 (3), 159–176.

    Article  MATH  MathSciNet  Google Scholar 

  14. Mihaljevic, M.J., M.P.C. Fossorier, and H. Imai (2000). “A low-complexity and high performance algorithm for the fast correlation attack.” Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, ed. B. Schneier. Springer-Verlag, Berlin, 196–212.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Canteaut, A. (2005). Fast Correlation Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_156

Download citation

Publish with us

Policies and ethics