메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 256-267

On the existence of secure feedback registers

Author keywords

Binary sequences; Cryptography; Nonlinear feedback registers; Security; Stream ciphers

Indexed keywords

BINARY SEQUENCES; CRYPTOGRAPHY;

EID: 0345946916     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_23     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 2
    • 0021522644 scopus 로고
    • How to generate crvptographically strong sequences of pseudorandom bits
    • M. Blum and S. Micali: How to generate crvptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13, 850-864 (1984).
    • (1984) SIAM Journal on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 3
    • 38249008578 scopus 로고
    • On the covering radius of Reed-Muller codes
    • G. Cohen and S. Litsyn: On the covering radius of Reed-Muller codes. Discrete Mathematics 106-107, 147-155 (1992).
    • (1992) Discrete Mathematics , vol.106-107 , pp. 147-155
    • Cohen, G.1    Litsyn, S.2
  • 4
    • 0025434562 scopus 로고
    • On the linear span of binary sequences from finite geometries, q odd
    • A.H. Chan and R.A. Games: On the linear span of binary sequences from finite geometries,q odd. IEEE Transactions on Information Theory 36, 548-552 (1990).
    • (1990) IEEE Transactions on Information Theory , vol.36 , pp. 548-552
    • Chan, A.H.1    Games, R.A.2
  • 5
    • 85013094137 scopus 로고
    • The differential cryptanalysis and design of natural stream ciphers
    • R. Anderson (ed.): Lecture Notes in Computer Science 809. Berlin: Springer
    • C. Ding: The differential cryptanalysis and design of natural stream ciphers. In: R. Anderson (ed.): Fast Software Encryption: Proceedings of 1993 Cambridge Security Workshop. Lecture Notes in Computer Science 809. Berlin: Springer 1994, pp. 101-120.
    • (1994) Fast Software Encryption: Proceedings of 1993 Cambridge Security Workshop , pp. 101-120
    • Ding, C.1
  • 6
    • 84948958360 scopus 로고
    • Linear cryptanalyis of stream ciphers
    • B. Preneel (ed.): Lecture Notes in Computer Science 1008. Berlin: Springer
    • J. Golić: Linear cryptanalyis of stream ciphers. In: B. Preneel (ed.): Fast Software Encryption: Proceedings of 1994 Leuven Security Workshop. Lecture Notes in Computer Science 1008. Berlin: Springer 1995, pp. 154-169.
    • (1995) Fast Software Encryption: Proceedings of 1994 Leuven Security Workshop , pp. 154-169
    • Golić, J.1
  • 7
    • 0015064669 scopus 로고
    • Generation of binary sequences with controllable complexity
    • E.J. Groth: Generation of binary sequences with controllable complexity. IEEE Transactions on Information Theory IT-17, 288-296 (1971).
    • (1971) IEEE Transactions on Information Theory , vol.IT-17 , pp. 288-296
    • Groth, E.J.1
  • 8
    • 0017017134 scopus 로고
    • An Analysis of the structure and complexity of nonlinear binary sequence generators
    • E.L. Key: An Analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory IT-22, 732-736 (1976).
    • (1976) IEEE Transactions on Information Theory , vol.IT-22 , pp. 732-736
    • Key, E.L.1
  • 9
    • 0028675685 scopus 로고
    • The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic
    • A. Klapper: The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic. Journal of Cryptology 7, 33-51 (1994).
    • (1994) Journal of Cryptology , vol.7 , pp. 33-51
    • Klapper, A.1
  • 12
    • 84957665414 scopus 로고
    • Cryptanalysis Based on 2-Adic Rational Approximation
    • D. Coppersmith (ed.) Lecture Notes in Computer Science 963. Berlin: Springer
    • A. Klapper and M. Goresky: Cryptanalysis Based on 2-Adic Rational Approximation. In: D. Coppersmith (ed.) Advances in Cryptology - CRYPTO'95. Lecture Notes in Computer Science 963. Berlin: Springer 1994, pp. 262-273.
    • (1994) Advances in Cryptology - CRYPTO'95 , pp. 262-273
    • Klapper, A.1    Goresky, M.2
  • 14
    • 85043762670 scopus 로고
    • A Provably-Secure Strongly-Randomized Cipher
    • S. Vanstone (ed.) Lecture Notes in Computer Science 473. Berlin: Springer
    • U. M. Maurer: A Provably-Secure Strongly-Randomized Cipher. In: S. Vanstone (ed.) Advances in Cryptology - CRYPTO'90. Lecture Notes in Computer Science 473. Berlin: Springer 1991, pp. 361-73.
    • (1991) Advances in Cryptology - CRYPTO'90 , pp. 361-373
    • Maurer, U.M.1
  • 17
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using cipertext only
    • T. Siegenthaler: Decrypting a class of stream ciphers using cipertext only. IEEE Transactions on Computing 34, 81-85 (1985).
    • (1985) IEEE Transactions on Computing , vol.34 , pp. 81-85
    • Siegenthaler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.