Results 281 to 290 of about 5,572,769 (345)
Some of the next articles are maybe not open access.
A Fast Correlation Attack on the Shrinking Generator
The Cryptographer's Track at RSA Conference, 2005In this paper we demonstrate a fast correlation attack on the shrinking generator with known connections. Our attack is applicable to arbitrary weight feedback polynomial of the generating LFSR and comparisons with other known attacks show that our attack offers good trade-offs between required keystream length, success probability and complexity.
Bin Zhang +3 more
openaire +3 more sources
A probabilistic correlation attack on the shrinking generator
Australasian Conference on Information Security and Privacy, 1998A probabilistic correlation attack on irregularly clocked shift registers is applied in a divide and conquer attack on the shrinking generator. Systematic computer simulations show that the joint probability is a suitable basis for the correlation attack and that, given a keystream segment of length linear in the length of the clock-controlled shift ...
Simpson, L., Dj. Golić, J., Dawson, E.
openaire +4 more sources
IEEE Transactions on Dependable and Secure Computing, 2021
Government agencies rely more and more heavily on the availability of flexible and intelligent solutions for the interception and analysis of Internet-based telecommunications.
F. Palmieri
semanticscholar +1 more source
Government agencies rely more and more heavily on the availability of flexible and intelligent solutions for the interception and analysis of Internet-based telecommunications.
F. Palmieri
semanticscholar +1 more source
Correlation attacks on combination generators [PDF]
The combination generator is a popular stream cipher construction. It consists of several independent devices working in parallel whose outputs are combined by a Boolean function. The output of this function is the keystream. The security of this generator has been extensively studied in the case where the devices are LFSRs. Some particular cases where
Canteaut, Anne, Naya-Plasencia, María
openaire +2 more sources
IEEE Transactions on Smart Grid, 2022
There are lots of cyber-attack, especially false data injection attacks, in modern power systems. This attack can circumvent traditional residual-based detection methods, and destroy the integrity of control information, thus hindering the stability of ...
Guangdou Zhang +5 more
semanticscholar +1 more source
There are lots of cyber-attack, especially false data injection attacks, in modern power systems. This attack can circumvent traditional residual-based detection methods, and destroy the integrity of control information, thus hindering the stability of ...
Guangdou Zhang +5 more
semanticscholar +1 more source
Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks
IEEE Communications Letters, 2021The alert correlation process that aggregates computer network security alerts to the same attack scenario provides a coherent view of network status at a higher abstraction level.
Qiumei Cheng, Chunming Wu, Shiying Zhou
semanticscholar +1 more source
A survey on fast correlation attacks [PDF]
Fast correlation attacks, pioneered by Meier and Staffelbach in 1988, constitute an important class of attacks on stream ciphers. They exploit a correlation between the keystream and the output of a linear feedback shift register (LFSR) within the cipher.
Carl Löndahl +3 more
openaire +1 more source

