-
1
-
-
0024665232
-
Clock-Controlled Shift Register: A Review
-
May
-
D. Gollmann, and W. Chambers, "Clock-Controlled Shift Register: A Review" IEEE J. Sel. Ar. Comm. vol. 7, No. 4, May 1989, pp. 525-533.
-
(1989)
IEEE J. Sel. Ar. Comm
, vol.7
, Issue.4
, pp. 525-533
-
-
Gollmann, D.1
Chambers, W.2
-
3
-
-
84974670663
-
The Shrinking Generator
-
Springer-Verlag
-
D. Coppersmith, H. Krawczyk, and Y. Mansour, "The Shrinking Generator", Proceedings of Crypto 93, Springer-Verlag, 1994, pp 22-39.
-
(1994)
Proceedings of Crypto
, vol.93
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
4
-
-
63449096678
-
-
R. Lidl, and H. Niederreiter, Introduction to Finite Fields and Their Applications, UK: Cambridge University Press, 1986.
-
R. Lidl, and H. Niederreiter, " Introduction to Finite Fields and Their Applications", UK: Cambridge University Press, 1986.
-
-
-
-
5
-
-
3042608572
-
Clock-Controlled Generators
-
PhD thesis, University of London
-
A. Kanso, "Clock-Controlled Generators", PhD thesis, University of London 1999, pp. 161.
-
(1999)
, pp. 161
-
-
Kanso, A.1
-
6
-
-
0025824847
-
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenstein Distance
-
J. Golic, and M. Mihaljevic, "A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenstein Distance", Journal of Cryptology, 3, 1991, pp. 201-212.
-
(1991)
Journal of Cryptology
, vol.3
, pp. 201-212
-
-
Golic, J.1
Mihaljevic, M.2
-
7
-
-
84957682296
-
Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers
-
J. Golic, "Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers", Lecture Notes in Computer Science 921 (EuroCrypt 95), 1995, pp. 248-262.
-
(1995)
Lecture Notes in Computer Science 921 (EuroCrypt 95)
, pp. 248-262
-
-
Golic, J.1
-
8
-
-
0024860262
-
Fast Correlation Attacks on Certain Stream Ciphers
-
W. Meir, and O. Staffelbach, "Fast Correlation Attacks on Certain Stream Ciphers", Journal of Cryptology, 1, 1989, pp. 159-176.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meir, W.1
Staffelbach, O.2
-
9
-
-
0021489155
-
Correlation-Immunity of Non-linear Combining Functions for Cryptographic Applications
-
T. Siegenthaler, "Correlation-Immunity of Non-linear Combining Functions for Cryptographic Applications", IEEE Trans On Information Theory, 30, 1984, pp. 776-780.
-
(1984)
IEEE Trans On Information Theory
, vol.30
, pp. 776-780
-
-
Siegenthaler, T.1
-
10
-
-
84955576147
-
On the Security of Shift Register Based Keystream Generators
-
R. Anderson, Editor, Springer-Verlag
-
J. Golic, "On the Security of Shift Register Based Keystream Generators", R. Anderson, Editor, Fast Software Encryption, Cambridge Security Workshop (LNCS 809), Springer-Verlag, 1994, pp. 90-100.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop (LNCS
, vol.809
, pp. 90-100
-
-
Golic, J.1
-
11
-
-
84947776392
-
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators, Advances of Cryptology (AsiaCrypt 98)
-
T. Johansson, "Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators", Advances of Cryptology (AsiaCrypt 98), Lecture Notes in Computer Science, vol. 1514, 1998, pp. 342-356.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 342-356
-
-
Johansson, T.1
-
12
-
-
85028870469
-
An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure, Advances in Cryptology (AusCrypt 92)
-
M. Mihaljevic, "An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure", Advances in Cryptology (AusCrypt 92), Lecture Notes in Computer Science, vol. 178, 1993, pp. 349-356
-
(1993)
Lecture Notes in Computer Science
, vol.178
, pp. 349-356
-
-
Mihaljevic, M.1
-
13
-
-
84948975118
-
Embedding Probabilistic Correlation Attacks on Clock-Controlled Shift Registers, Advances in Cryptology (EuroCrypt 94)
-
J. Golic, and L. O.Connor, "Embedding Probabilistic Correlation Attacks on Clock-Controlled Shift Registers", Advances in Cryptology (EuroCrypt 94), Lecture Notes in Computer Science, vol. 950, 1995, pp. 230-243.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 230-243
-
-
Golic, J.1
Connor, L.O.2
-
14
-
-
84956857565
-
A Probabilistic Correlation Attack on the Shrinking Generator
-
L. Simpson, J. Golic, and E. Dawson, "A Probabilistic Correlation Attack on the Shrinking Generator", ACISP 1998, pp. 147-158.
-
(1998)
ACISP
, pp. 147-158
-
-
Simpson, L.1
Golic, J.2
Dawson, E.3
-
15
-
-
84957702423
-
Improved Fast Correlation Attacks on Certain Stream Ciphers via Convolutional Codes
-
Advances in Cryptography EuroCrypt 99, Springer-Verlag
-
T. Johansson, F.Jonsson, "Improved Fast Correlation Attacks on Certain Stream Ciphers via Convolutional Codes", Advances in Cryptography (EuroCrypt 99), Lecture Notes in Computer Science, vol. 1592, Springer-Verlag, 1999, pp. 347-362.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jonsson, F.2
-
16
-
-
84974625340
-
-
T. Johansson, F.Jonsson, Fast Correlation Attacks Through Reconstruction of Linear Polynomials, Advances in Cryptology (Crypto 2000), Lecture Notes in Computer Science, 1880, Springer-Verlag, 2000, pp. 300-315.
-
T. Johansson, F.Jonsson, "Fast Correlation Attacks Through Reconstruction of Linear Polynomials", Advances in Cryptology (Crypto 2000), Lecture Notes in Computer Science, vol. 1880, Springer-Verlag, 2000, pp. 300-315.
-
-
-
-
17
-
-
0021519766
-
Linear Equivalence of Certain BRM Shift Register Sequences
-
November
-
W. Chambers, and S. Jennings, "Linear Equivalence of Certain BRM Shift Register Sequences", Electronics Letters, vol. 20, November 1984, pp.1018-1019.
-
(1984)
Electronics Letters
, vol.20
, pp. 1018-1019
-
-
Chambers, W.1
Jennings, S.2
|