References
Anderson, R.J. (1995). “Searching for the optimum correlation attack.” Fast Software Encryption 1994, Lecture Notes in Computer Science, vol. 1008, ed. B. Preneel. Springer-Verlag, Berlin, 137–143.
Canteaut, A. and E. Filiol (2002). “On the influence of the filtering function on the performance of fast correlation attacks on filter generators.” Symposium on Information Theory in the Benelux, May 2002.
Canteaut, A. and M. Trabbia (2000). “Improved fast correlation attacks using parity-check equations of weight 4 and 5.” Advances in Cryptology—EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, ed. B. Preneel. Springer-Verlag, Berlin, 573–588.
Chepyshov, V., T. Johansson, and B. Smeets (2000). “A simple algorithm for fast correlation attacks on stream ciphers.” Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, ed. B. Schneier. Springer-Verlag, Berlin, 181–195.
Golić, J.Dj. (1996). “On the security of nonlinear filter generators.” Fast Software Encryption 1996, Lecture Notes in Computer Science, vol. 1039, ed. D. Gollman. Springer-Verlag, Berlin, 173–188.
Johansson, T. and F. Jönsson (1999). “Improved fast correlation attack on stream ciphers via convolutional codes.” Advances in Cryptology—EUROCRYPT'99, Lecture Notes in Computer Science, vol. 1592, ed. J. Stern. Springer-Verlag, Berlin, 347–362.
Johansson, T. and F. Jönsson (1999). “Fast correlation attacks based on turbo code techniques.” Advances in Cryptology—CRYPTO'99, Lecture Notes in Computer Science, vol. 1666, ed. J. Wiener. Springer-Verlag, Berlin, 181–197.
Johansson, T. and F. Jönsson (2000). “Fast correlation attacks through reconstruction of linear polynomials.” Advances in Cryptology—CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, ed. M. Bellare. Springer-Verlag, Berlin, 300–315.
Jönsson, F. (2002). “Some results on fast correlation attacks.” PhD Thesis, University of Lund, Sweden.
Jönsson, F. and T. Johansson (2002). “A fast correlation attack on LILI-128.” Information Processing Letters, 81 (3), 127–132.
Lee, S., S. Chee, S. Park, and S. Park (1996). “Conditional correlation attack on nonlinear filter generators.” Advances in Cryptography—ASIACRYPT'96, Lecture Notes in Computer Science, vol. 1163, eds. K. Kim and T. Matsumoto. Springer-Verlag, Berlin, 360–367.
Meier, W. and O. Staffelbach (1988). “Fast correlation attacks on stream ciphers.” Advances in Cryptology—EUROCRYPT'88, Lecture Notes in Computer Science, vol. 330, ed. C.G. Günther. Springer-Verlag, Berlin, 301–314.
Meier, W. and O. Staffelbach (1989). “Fast correlation attack on certain stream ciphers.” J. Cryptology, 1 (3), 159–176.
Mihaljevic, M.J., M.P.C. Fossorier, and H. Imai (2000). “A low-complexity and high performance algorithm for the fast correlation attack.” Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, ed. B. Schneier. Springer-Verlag, Berlin, 196–212.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Canteaut, A. (2005). Fast Correlation Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_156
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_156
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering