2006
DOI: 10.1007/11767480_13
|View full text |Cite
|
Sign up to set email alerts
|

The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Note that neglecting this scanning task is a common practices employed and reported in the literature: see e.g. [11, Table I], [6, p. 354], [7, Table 2], [14,Remark 5]). (An additional justification for neglecting the screening complexity originates from the fact that in certain scenarios where the same secret key is assigned to a group of entities, the sample collection-screening can be performed in parallel.…”
Section: Theoremmentioning
confidence: 98%
“…Note that neglecting this scanning task is a common practices employed and reported in the literature: see e.g. [11, Table I], [6, p. 354], [7, Table 2], [14,Remark 5]). (An additional justification for neglecting the screening complexity originates from the fact that in certain scenarios where the same secret key is assigned to a group of entities, the sample collection-screening can be performed in parallel.…”
Section: Theoremmentioning
confidence: 98%
“…The nonlinearity of n-variable M-M resilient functions cannot exceed 2 n−1 − 2 ⌊n/2⌋ . The M-M technique in general does not generate degreeoptimized functions and the M-M functions are potentially cryptographically weak [2], [9].…”
Section: Introductionmentioning
confidence: 99%