Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
9
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,006
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT 2002
Fast Correlation Attacks: An Algorithmic Point of View
other
Author(s):
Philippe Chose
,
Antoine Joux
,
Michel Mitton
Publication date
(Online):
April 29 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Information Services & Use
Most cited references
9
Record
: found
Abstract
: not found
Article
: not found
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
T. Siegenthaler
(1984)
0
comments
Cited
80
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
Richard Schroeppel
,
Adi Shamir
(1981)
0
comments
Cited
42
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5
Anne Canteaut
,
Michaël Trabbia
(2000)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
April 29 2002
Pages
: 209-221
DOI:
10.1007/3-540-46035-7_14
SO-VID:
ee036ef2-b059-46d8-8ce5-23870017fd70
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 222
BDD-Based Cryptanalysis of Keystream Generators
pp. 352
On Deniability in Quantum Key Exchange
pp. 110
Indistinguishability of Random Systems
pp. 209
Fast Correlation Attacks: An Algorithmic Point of View
pp. 272
Optimal Security Proofs for PSS and Other Signature Schemes
pp. 299
Cryptanalysis of the Revised NTRU Signature Scheme
pp. 321
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
pp. 337
Universally Composable Notions of Key Exchange and Secure Channels
pp. 384
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
pp. 400
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods
pp. 418
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
pp. 450
Traitor Tracing with Constant Transmission Rate
pp. 466
Toward Hierarchical Identity-Based Encryption
pp. 482
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch
pp. 502
Perfectly Secure Message Transmission Revisited
pp. 518
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis
pp. 534
Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS...
Similar content
1,006
Risk of Recurrent Cerebrovascular Events in Patients with Cryptogenic Stroke or Transient Ischemic Attack and Patent Foramen Ovale: The FORI (Foramen Ovale Registro Italiano) Study
Authors:
Maurizio Paciaroni
,
Giancarlo Agnelli
,
Andréa C. BERTOLINI
…
Generation of a large-scale vorticity in a fast rotating density stratified turbulence or turbulent convection
Authors:
Igor Rogachevskii
,
Nathan Kleeorin
Fast Dynamic Graph Algorithms for Parameterized Problems
Authors:
Keigo Oka
,
Yoichi Iwata
See all similar
Cited by
11
New Generic Algorithms for Hard Knapsacks
Authors:
Nick Howgrave-Graham
,
Antoine Joux
Faster Correlation Attack on Bluetooth Keystream Generator E0
Authors:
Yi. Lu
,
Serge Vaudenay
Improving the Time Complexity of Matsui’s Linear Cryptanalysis
Authors:
Baudoin Collard
,
F. Standaert
,
Jean-Jacques Quisquater
See all cited by