Title | Citations | PageRank | Year |
---|---|---|---|
Cryptanalysis of Achterbahn | 9 | 1.41 | 2006 |
Fault attacks on combiners with memory | 6 | 0.57 | 2005 |
Distinguishing attacks on t-functions | 6 | 0.66 | 2005 |
The conditional correlation attack: a practical attack on bluetooth encryption | 26 | 1.84 | 2005 |
Algebraic Attacks and Decomposition of Boolean Functions | 166 | 7.16 | 2004 |
Predicting the shrinking generator with fixed connections | 19 | 0.89 | 2003 |
Algebraic attacks on stream ciphers with linear feedback | 436 | 21.11 | 2003 |
Analysis of SSC2 | 2 | 0.42 | 2001 |
Cryptanalysis of an identification scheme based on the permuted perceptron problem | 5 | 0.61 | 1999 |