-
1
-
-
84974670663
-
The shrinking generator
-
Advances in Cryptology, CRYPTO '93 , Berlin, Germany: Springer-Verlag
-
D. Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator," in Advances in Cryptology - CRYPTO '93 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1993, vol. 773, pp. 22-39.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
2
-
-
35248859228
-
Predicting the shrinking generator with fixed connections
-
Advances in Cryptology, EUROCRYPT, Berlin, Germany: Springer-Verlag
-
P. Ekdahl, W. Meier, and T. Johansson, "Predicting the shrinking generator with fixed connections," in Advances in Cryptology - EUROCRYPT 2003 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003, vol. 2656, pp. 330-344.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 330-344
-
-
Ekdahl, P.1
Meier, W.2
Johansson, T.3
-
3
-
-
84955594784
-
Intrinsic statistical weakness of keystream generators
-
Advances in Cryptology, ASIACRYPT'94 , Berlin, Germany: Springer-Verlag
-
J. Dj. Golić, "Intrinsic statistical weakness of keystream generators," in Advances in Cryptology - ASIACRYPT'94 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1995, vol. 917, pp. 91-103.
-
(1995)
Lecture Notes in Computer Science
, vol.917
, pp. 91-103
-
-
Golić, J.D.1
-
4
-
-
84948975118
-
Embedding and probabilistic correlation attacks on clock-controlled shift registers
-
Advances in Cryptology-EUROCRYPT'94 , Berlin, Germany: Springer-Verlag
-
J. Dj. Golić and L. O'Connor, "Embedding and probabilistic correlation attacks on clock-controlled shift registers," in Advances in Cryptology-EUROCRYPT'94 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1995, vol. 950, pp. 230-243.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 230-243
-
-
Golić, J.D.1
O'Connor, L.2
-
5
-
-
84957682296
-
Toward fast correlation attacks on irregularly clocked shift registers
-
Advances in Cryptology-EUROCRYPT'95 , Berlin, Germany: Springer-Verlag
-
J. D. Golić, 'Toward fast correlation attacks on irregularly clocked shift registers," in Advances in Cryptology-EUROCRYPT'95 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1995, vol. 921, pp. 248-262.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 248-262
-
-
Golić, J.D.1
-
6
-
-
33646781163
-
Linear models for keystream generators
-
Jan
-
_, "Linear models for keystream generators," IEEE Trans. Comput., vol. 45, no. 1, pp. 41-49, Jan. 1996.
-
(1996)
IEEE Trans. Comput
, vol.45
, Issue.1
, pp. 41-49
-
-
Golić, J.D.1
-
7
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
Oct
-
_, "Computation of low-weight parity-check polynomials," Electron. Lett., vol. 32, no. 21, pp. 1981-1982, Oct. 1996.
-
(1996)
Electron. Lett
, vol.32
, Issue.21
, pp. 1981-1982
-
-
Golić, J.D.1
-
8
-
-
84880855404
-
Correlation analysis of the shrinking generator
-
Advances in cryptology, CRYPTO, Berlin, Germany: Springer-Verlag
-
_, "Correlation analysis of the shrinking generator," in Advances in cryptology - CRYPTO 2001 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2001, vol. 2139, pp. 440-457.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 440-457
-
-
Golić, J.D.1
-
9
-
-
84947776392
-
Reduced complexity correlation attacks on two clock-controlled generators
-
Advances in Cryptology, ASIACRYPT98 , Berlin, Germany: Springer-Verlag
-
T. Johansson, "Reduced complexity correlation attacks on two clock-controlled generators," in Advances in Cryptology - ASIACRYPT98 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1998, vol. 1514, pp. 342-357.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 342-357
-
-
Johansson, T.1
-
10
-
-
0346602660
-
On the linear consistency test (LCT) in cryptanalysis with applications
-
Advances in Cryptology, CRYPTO'89 , Berlin, Germany: Springer-Verlag
-
K. Zeng, C. H. Yang, and T. R. N. Rao, "On the linear consistency test (LCT) in cryptanalysis with applications," in Advances in Cryptology - CRYPTO'89 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1990, vol. 435, pp. 164-174.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 164-174
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.N.3
|