{"id":"https://openalex.org/W2121829660","doi":"https://doi.org/10.1109/istc.2012.6325183","title":"Improved message passing techniques in fast correlation attacks on stream ciphers","display_name":"Improved message passing techniques in fast correlation attacks on stream ciphers","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2121829660","doi":"https://doi.org/10.1109/istc.2012.6325183","mag":"2121829660"},"language":"en","primary_location":{"id":"doi:10.1109/istc.2012.6325183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istc.2012.6325183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 7th International Symposium on Turbo Codes and Iterative Information Processing (ISTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062912222","display_name":"Martin \u00c5gren","orcid":"https://orcid.org/0000-0003-1451-7505"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Martin Agren","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden","Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]},{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000716418","display_name":"Martin Hell","orcid":"https://orcid.org/0000-0002-5694-5447"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Martin Hell","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden","Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]},{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019956193","display_name":"Thomas Johansson","orcid":"https://orcid.org/0000-0003-1798-570X"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Thomas Johansson","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden","Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]},{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069212496","display_name":"Carl L\u00f6ndahl","orcid":null},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Carl Londahl","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden","Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]},{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062912222"],"corresponding_institution_ids":["https://openalex.org/I187531555"],"apc_list":null,"apc_paid":null,"fwci":0.8563,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79837271,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1807","issue":null,"first_page":"260","last_page":"264"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.7641918659210205},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7223654389381409},{"id":"https://openalex.org/keywords/message-passing","display_name":"Message passing","score":0.668928861618042},{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.5947613716125488},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5913683772087097},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5834673643112183},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4644966125488281},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4388556480407715},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4160591959953308},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.1807333528995514}],"concepts":[{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.7641918659210205},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7223654389381409},{"id":"https://openalex.org/C854659","wikidata":"https://www.wikidata.org/wiki/Q1859284","display_name":"Message passing","level":2,"score":0.668928861618042},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.5947613716125488},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5913683772087097},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5834673643112183},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4644966125488281},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4388556480407715},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4160591959953308},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.1807333528995514}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/istc.2012.6325183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istc.2012.6325183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 7th International Symposium on Turbo Codes and Iterative Information Processing (ISTC)","raw_type":"proceedings-article"},{"id":"pmh:oai:lup.lub.lu.se:649c2ed3-a886-44ad-a7bd-73c219951860","is_oa":false,"landing_page_url":"https://lup.lub.lu.se/record/2682437","pdf_url":null,"source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1582363331","https://openalex.org/W1599918776","https://openalex.org/W1661175875","https://openalex.org/W1979198062","https://openalex.org/W2102251435","https://openalex.org/W2102864653","https://openalex.org/W2121606987","https://openalex.org/W2123530431","https://openalex.org/W2128765501","https://openalex.org/W2161517294","https://openalex.org/W4300188436"],"related_works":["https://openalex.org/W88466764","https://openalex.org/W4389258758","https://openalex.org/W4245501402","https://openalex.org/W2533921573","https://openalex.org/W3174959224","https://openalex.org/W2149094354","https://openalex.org/W1979198062","https://openalex.org/W2545039056","https://openalex.org/W3044322697","https://openalex.org/W2613508444"],"abstract_inverted_index":{"The":[0],"fast":[1],"correlation":[2],"attack":[3,8],"is":[4,14],"a":[5,49,60],"general":[6],"cryptanalytic":[7],"directed":[9],"at":[10],"stream":[11],"ciphers":[12],"and":[13],"related":[15],"to":[16,97],"the":[17,29,35,38,56,73,89],"decoding":[18],"of":[19,40,44,58,70],"low-density":[20],"parity-check":[21],"(LDPC)":[22],"codes.":[23],"In":[24],"this":[25,80],"paper,":[26],"we":[27],"improve":[28],"message":[30,74],"passing":[31,75],"algorithm":[32],"by":[33],"exploiting":[34],"fact":[36],"that":[37,79],"sum":[39,57],"an":[41],"arbitrary":[42],"number":[43],"initial":[45],"state":[46],"variables,":[47],"called":[48],"fixed":[50],"point,":[51],"can":[52],"be":[53],"written":[54],"as":[55],"only":[59],"few":[61],"other":[62],"variables.":[63],"This":[64],"will":[65],"result":[66],"in":[67,72,84],"better":[68,85],"use":[69],"information":[71,82],"algorithm.":[76],"Simulations":[77],"show":[78],"added":[81],"results":[83],"success":[86],"probabilities":[87],"for":[88],"attack.":[90],"Our":[91],"technique":[92],"may":[93],"also":[94],"find":[95],"applications":[96],"LDPC":[98],"codes":[99,105],"with":[100],"girth":[101],"4,":[102],"although":[103],"such":[104],"are":[106],"normally":[107],"avoided.":[108]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
