Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2017_29_4_a0, author = {E. K. Alekseev and L. A. Kuschinskaja}, title = {Generalization of one method of a filter generator key recovery}, journal = {Diskretnaya Matematika}, pages = {3--27}, publisher = {mathdoc}, volume = {29}, number = {4}, year = {2017}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2017_29_4_a0/} }
E. K. Alekseev; L. A. Kuschinskaja. Generalization of one method of a filter generator key recovery. Diskretnaya Matematika, Tome 29 (2017) no. 4, pp. 3-27. http://geodesic.mathdoc.fr/item/DM_2017_29_4_a0/
[1] Alekseev E.K., Kushchinskaya L.A., “On the construction of generalized approximations for one filter generator key recovery method”, 6rd Workshop on Current Trends in Cryptology (CTCrypt 2017), Pre-proceedings, 2017, 247–259
[2] Ashur T., Beyne T., Rijmen V., “Revisiting the wrong-key-randomization hypothesis”, Report 2016/990, IACR Cryptology ePrint Archive, 2016
[3] Biham E., Shamir A., “Differential cryptanalysis of DES-like cryptosystems”, J. Cryptology, 4:1 (1991), 3–72 | DOI | MR | Zbl
[4] Bogdanov A., Tischhauser E., “On the wrong key randomisation and key equivalence hypotheses in Matsui's algorithm 2”, FSE 2013, Lect. Notes Comput. Sci., 8424, Springer, 2013, 19–38 | DOI
[5] Collard B., Standaert F.-X., “Experimenting linear cryptanalysis.”, Advanced Linear Cryptanalysis of Block and Stream Ciphers, Cryptology and Information Security Series, 7, IOS Press, 2011 | Zbl
[6] Dawson E., Clark A., Golic J., Millan W., Penna L., Simpson L., “The LILI-128 keystream generator”, Proc. of first NESSIE workshop, Leuven, 2000 http://www.cryponessie.org | MR
[7] Junod P., “On the complexity of Matsui's attack”, Lect. Notes Comput. Sci., 2259, 2001, 199–211 | DOI | MR | Zbl
[8] Matsui M., “Linear cryptanalysis method for DES cipher”, EUROCRYPT '93, Lect. Notes Comput. Sci., 765, 1994, 386-397 | DOI | Zbl
[9] Meier W., Staffelbach O., “Fast correlation attacks on certain stream cipher”, J. Cryptology, 1:3 (1989), 159-176 | DOI | MR | Zbl
[10] Siegenthaler T., “Decrypting a class of stream cipher using ciphertext only”, IEEE Trans. Computers, C-34(1) (1985), 81-85 | DOI
[11] Alekseev E. K., “Ob atake na filtruyuschii generator s funktsiei uslozhneniya, blizkoi k algebraicheski vyrozhdennoi”, Sb. statei molodykh uchenykh fakulteta VMK MGU, 2011, no. 8, 114-123
[12] Alekseev E.K., “O nekotorykh merakh nelineinosti bulevykh funktsii”, Prikladnaya diskretnaya matematika, 2 (2011), 5-16
[13] Glukhov M.M., Elizarov V.P., Nechaev A.A., Algebra, Uchebnik. V 2-kh t., Gelios ARV, M., 2003, 416 pp.
[14] Logachev O.A., Salnikov A.A., Smyshlyaev S.V., Yaschenko V.V., Bulevy funktsii v teorii kodirovaniya i kriptografii, LENAND, Moskva, 2015, 584 pp.
[15] Sevastyanov B.A., Kurs teorii veroyatnostei i matematicheskoi statistiki, Nauka. Glavnaya redaktsiya fiziko-matematicheskoi literatury, M., 1982, 256 pp. | MR