메뉴 건너뛰기




Volumn 2727 LNCS, Issue , 2003, Pages 443-451

Clock-controlled shrinking generator of feedback shift registers

Author keywords

[No Author keywords available]

Indexed keywords

CORRELATION ATTACKS; DE BRUIJN SEQUENCES; FEEDBACK SHIFT REGISTERS; LINEAR COMPLEXITY; M SEQUENCES; OUTPUT SEQUENCES; STATISTICAL PROPERTIES; STREAM CIPHERS; CORRELATION ATTACK; DEBRUIJN SEQUENCES; FEEDBACK SHIFT REGISTER; M SEQUENCE;

EID: 33749481248     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45067-X_38     Document Type: Conference Paper
Times cited : (23)

References (17)
  • 1
    • 0024665232 scopus 로고
    • Clock-Controlled Shift Register: A Review
    • May
    • D. Gollmann, and W. Chambers, "Clock-Controlled Shift Register: A Review" IEEE J. Sel. Ar. Comm. vol. 7, No. 4, May 1989, pp. 525-533.
    • (1989) IEEE J. Sel. Ar. Comm , vol.7 , Issue.4 , pp. 525-533
    • Gollmann, D.1    Chambers, W.2
  • 4
    • 63449096678 scopus 로고    scopus 로고
    • R. Lidl, and H. Niederreiter, Introduction to Finite Fields and Their Applications, UK: Cambridge University Press, 1986.
    • R. Lidl, and H. Niederreiter, " Introduction to Finite Fields and Their Applications", UK: Cambridge University Press, 1986.
  • 5
    • 3042608572 scopus 로고    scopus 로고
    • Clock-Controlled Generators
    • PhD thesis, University of London
    • A. Kanso, "Clock-Controlled Generators", PhD thesis, University of London 1999, pp. 161.
    • (1999) , pp. 161
    • Kanso, A.1
  • 6
    • 0025824847 scopus 로고
    • A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenstein Distance
    • J. Golic, and M. Mihaljevic, "A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenstein Distance", Journal of Cryptology, 3, 1991, pp. 201-212.
    • (1991) Journal of Cryptology , vol.3 , pp. 201-212
    • Golic, J.1    Mihaljevic, M.2
  • 7
    • 84957682296 scopus 로고
    • Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers
    • J. Golic, "Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers", Lecture Notes in Computer Science 921 (EuroCrypt 95), 1995, pp. 248-262.
    • (1995) Lecture Notes in Computer Science 921 (EuroCrypt 95) , pp. 248-262
    • Golic, J.1
  • 8
    • 0024860262 scopus 로고
    • Fast Correlation Attacks on Certain Stream Ciphers
    • W. Meir, and O. Staffelbach, "Fast Correlation Attacks on Certain Stream Ciphers", Journal of Cryptology, 1, 1989, pp. 159-176.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meir, W.1    Staffelbach, O.2
  • 9
    • 0021489155 scopus 로고
    • Correlation-Immunity of Non-linear Combining Functions for Cryptographic Applications
    • T. Siegenthaler, "Correlation-Immunity of Non-linear Combining Functions for Cryptographic Applications", IEEE Trans On Information Theory, 30, 1984, pp. 776-780.
    • (1984) IEEE Trans On Information Theory , vol.30 , pp. 776-780
    • Siegenthaler, T.1
  • 10
    • 84955576147 scopus 로고
    • On the Security of Shift Register Based Keystream Generators
    • R. Anderson, Editor, Springer-Verlag
    • J. Golic, "On the Security of Shift Register Based Keystream Generators", R. Anderson, Editor, Fast Software Encryption, Cambridge Security Workshop (LNCS 809), Springer-Verlag, 1994, pp. 90-100.
    • (1994) Fast Software Encryption, Cambridge Security Workshop (LNCS , vol.809 , pp. 90-100
    • Golic, J.1
  • 11
    • 84947776392 scopus 로고    scopus 로고
    • Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators, Advances of Cryptology (AsiaCrypt 98)
    • T. Johansson, "Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators", Advances of Cryptology (AsiaCrypt 98), Lecture Notes in Computer Science, vol. 1514, 1998, pp. 342-356.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 342-356
    • Johansson, T.1
  • 12
    • 85028870469 scopus 로고
    • An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure, Advances in Cryptology (AusCrypt 92)
    • M. Mihaljevic, "An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure", Advances in Cryptology (AusCrypt 92), Lecture Notes in Computer Science, vol. 178, 1993, pp. 349-356
    • (1993) Lecture Notes in Computer Science , vol.178 , pp. 349-356
    • Mihaljevic, M.1
  • 13
    • 84948975118 scopus 로고
    • Embedding Probabilistic Correlation Attacks on Clock-Controlled Shift Registers, Advances in Cryptology (EuroCrypt 94)
    • J. Golic, and L. O.Connor, "Embedding Probabilistic Correlation Attacks on Clock-Controlled Shift Registers", Advances in Cryptology (EuroCrypt 94), Lecture Notes in Computer Science, vol. 950, 1995, pp. 230-243.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 230-243
    • Golic, J.1    Connor, L.O.2
  • 14
    • 84956857565 scopus 로고    scopus 로고
    • A Probabilistic Correlation Attack on the Shrinking Generator
    • L. Simpson, J. Golic, and E. Dawson, "A Probabilistic Correlation Attack on the Shrinking Generator", ACISP 1998, pp. 147-158.
    • (1998) ACISP , pp. 147-158
    • Simpson, L.1    Golic, J.2    Dawson, E.3
  • 15
    • 84957702423 scopus 로고    scopus 로고
    • Improved Fast Correlation Attacks on Certain Stream Ciphers via Convolutional Codes
    • Advances in Cryptography EuroCrypt 99, Springer-Verlag
    • T. Johansson, F.Jonsson, "Improved Fast Correlation Attacks on Certain Stream Ciphers via Convolutional Codes", Advances in Cryptography (EuroCrypt 99), Lecture Notes in Computer Science, vol. 1592, Springer-Verlag, 1999, pp. 347-362.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 347-362
    • Johansson, T.1    Jonsson, F.2
  • 16
    • 84974625340 scopus 로고    scopus 로고
    • T. Johansson, F.Jonsson, Fast Correlation Attacks Through Reconstruction of Linear Polynomials, Advances in Cryptology (Crypto 2000), Lecture Notes in Computer Science, 1880, Springer-Verlag, 2000, pp. 300-315.
    • T. Johansson, F.Jonsson, "Fast Correlation Attacks Through Reconstruction of Linear Polynomials", Advances in Cryptology (Crypto 2000), Lecture Notes in Computer Science, vol. 1880, Springer-Verlag, 2000, pp. 300-315.
  • 17
    • 0021519766 scopus 로고
    • Linear Equivalence of Certain BRM Shift Register Sequences
    • November
    • W. Chambers, and S. Jennings, "Linear Equivalence of Certain BRM Shift Register Sequences", Electronics Letters, vol. 20, November 1984, pp.1018-1019.
    • (1984) Electronics Letters , vol.20 , pp. 1018-1019
    • Chambers, W.1    Jennings, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.