메뉴 건너뛰기




Volumn 2384, Issue , 2002, Pages 25-39

The LILI-II keystream generator

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84947439509     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45450-0_3     Document Type: Conference Paper
Times cited : (29)

References (24)
  • 2
    • 0005239414 scopus 로고
    • A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection
    • S. Babbage. A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection, IEE Conference Publication No. 408, May 1995.
    • (1995) IEE Conference Publication No , pp. 408
    • Babbage, S.1
  • 5
    • 0034295410 scopus 로고    scopus 로고
    • Embedding attacks on step[1..D] clockcontrolled generators
    • W.G. Chambers and D. Gollmann. Embedding attacks on step[1..D] clockcontrolled generators. Electronics Letters, vol.36 pp.1771-1773, 2000.
    • (2000) Electronics Letters , vol.36 , pp. 1771-1773
    • Chambers, W.G.1    Gollmann, D.2
  • 8
    • 0025824847 scopus 로고
    • A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance
    • J. Dj. Golic and M. J. Mihaljevic. A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journalof Cryptology, vol. 3(3), pp. 201–212, 1991.
    • (1991) Journalof Cryptology , vol.3 , Issue.3 , pp. 201-212
    • Golic, J.D.1    Mihaljevic, M.J.2
  • 14
    • 0036471040 scopus 로고    scopus 로고
    • Parallel Stream Cipher for Secure High-Speed Communications
    • H-J. Lee and S-J. Moon Parallel Stream Cipher for Secure High-Speed Communications. SignalP rocessing, vol. 82, no. 2, pp. 137-143, 2002.
    • (2002) Signalp Rocessing , vol.82 , Issue.2 , pp. 137-143
    • Lee, H.-J.1    Moon, S.-J.2
  • 16
    • 0024860262 scopus 로고
    • Fast Correlation Attacks on Certain Stream Ciphers
    • W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journalof Cryptology, vol. 1(3), pp. 159–167, 1989.
    • (1989) Journalof Cryptology , vol.1 , Issue.3 , pp. 159-167
    • Meier, W.1    Staffelbach, O.2
  • 20
  • 22
    • 84949212529 scopus 로고    scopus 로고
    • LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology - SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261
    • L. Simpson, E. Dawson, J. Dj. Golic and W. Millan. LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology - SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261, Springer–Verlag, 2000.
    • (2000) Springer–Verlag
    • Simpson, L.1    Dawson, E.2    Golic, J.D.3    Millan, W.4
  • 24
    • 0026219481 scopus 로고
    • An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register
    • M. Živković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept 1991.
    • (1991) IEEE Trans. Inform. Theory, Vol. IT-37 , pp. 1488-1490
    • Ivkovic, M.Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.