-
1
-
-
84974670663
-
The shrinking generator
-
Lecture Notes in Computer Science, D. R. Stinson ed., Springer-Verlag
-
D. Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator," Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science, vol. 773, D. R. Stinson ed., Springer-Verlag, pp. 22-39, 1994.
-
(1994)
Advances in Cryptology - CRYPTO '93
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
2
-
-
0025229050
-
Minimal linear equivalent analysis of a variable-memory binary sequence generator
-
IT-36, Jan
-
J. Dj. Golić and M. J. Mihaljević, "Minimal linear equivalent analysis of a variable-memory binary sequence generator," IEEE Trans. Inform. Theory, vol. IT-36, pp. 190-192, Jan. 1990.
-
(1990)
IEEE Trans. Inform. Theory
, pp. 190-192
-
-
Golić, J.D.1
Mihaljević, M.J.2
-
3
-
-
0025824847
-
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
-
J. Dj. Golić and M. J. Mihaljević, "A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance," J. Cryptology, vol. 3(3), pp. 201-212, 1991.
-
(1991)
J. Cryptology
, vol.3
, Issue.3
, pp. 201-212
-
-
Golić, J.D.1
Mihaljević, M.J.2
-
4
-
-
0010036629
-
Correlation via linear sequential circuit approximation of combiners with memory
-
Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
-
J. Dj. Golić, "Correlation via linear sequential circuit approximation of combiners with memory," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113-123, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT '92
, vol.658
, pp. 113-123
-
-
Golić, J.D.1
-
5
-
-
0008772856
-
A generalized correlation attack with a probabilistic constrained edit distance
-
Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
-
J. Dj. Golić and S. V. Petrovic, "A generalized correlation attack with a probabilistic constrained edit distance," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472-476, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT '92
, vol.658
, pp. 472-476
-
-
Golić, J.D.1
Petrovic, S.V.2
-
6
-
-
84955576147
-
On the security of shift register based keystream generators
-
Lecture Notes in Computer Science, R. J. Anderson ed., Springer-Verlag
-
J. Dj. Golić, "On the security of shift register based keystream generators," Fast Software Encryption - Cambridge '93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90-100, 1994.
-
(1994)
Fast Software Encryption - Cambridge '93
, vol.809
, pp. 90-100
-
-
Golić, J.D.1
-
7
-
-
84948975118
-
Embedding and probabilistic correlation attacks on clock-controlled shift registers
-
Lecture Notes in Computer Science, A. De Santis ed., Springer-Verlag
-
J. Dj. Golić and L. O’Connor, "Embedding and probabilistic correlation attacks on clock-controlled shift registers," Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 230-243, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT '94
, vol.950
, pp. 230-243
-
-
Golić, J.D.1
O’Connor, L.2
-
8
-
-
84955594784
-
Intrinsic statistical weakness of keystream generators
-
Lecture Notes in Computer Science, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag
-
J. Dj. Golić, "Intrinsic statistical weakness of keystream generators," Advances in Cryptology - ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91-103, 1995.
-
(1995)
Advances in Cryptology - ASIACRYPT '94
, vol.917
, pp. 91-103
-
-
Golić, J.D.1
-
9
-
-
0242549872
-
Correlation properties of a general binary combiner with memory
-
J. Dj. Golić, "Correlation properties of a general binary combiner with memory," J. Cryptology, vol. 9(2), pp. 111-126, 1996.
-
(1996)
J. Cryptology
, vol.9
, Issue.2
, pp. 111-126
-
-
Golić, J.D.1
-
10
-
-
33646781163
-
Linear models for keystream generators
-
C-45
-
J. Dj. Golić, "Linear models for keystream generators," IEEE Trans. Comput., vol. C-45, pp. 41-49, 1996.
-
(1996)
IEEE Trans. Comput.
, pp. 41-49
-
-
Golić, J.D.1
-
11
-
-
0024665232
-
Clock-controlled shift registers: A review
-
May
-
D. Gollmann and W. G. Chambers, "Clock-controlled shift registers: a review," IEEE J. Select. Areas Commun., vol. 7(4), pp. 525-533, May 1989.
-
(1989)
IEEE J. Select. Areas Commun.
, vol.7
, Issue.4
, pp. 525-533
-
-
Gollmann, D.1
Chambers, W.G.2
-
13
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, "Fast correlation attacks on certain stream ciphers," J. Cryptology, vol. 1(3), pp. 159-176, 1989.
-
(1989)
J. Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
14
-
-
0026678847
-
Correlation properties of combiners with memory in stream ciphers
-
W. Meier and O. Staffelbach, "Correlation properties of combiners with memory in stream ciphers," J. Cryptology, vol. 5(1), pp. 67-86, 1992.
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 67-86
-
-
Meier, W.1
Staffelbach, O.2
-
15
-
-
85028870469
-
An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure
-
Lecture Notes in Computer Science, J. Seberry and Y. Zheng eds., Springer-Verlag
-
M. J. Mihaljević, "An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure," Advances in Cryptology - AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, J. Seberry and Y. Zheng eds., Springer-Verlag, pp. 349-356, 1993.
-
(1993)
Advances in Cryptology - AUSCRYPT '92
, vol.718
, pp. 349-356
-
-
Mihaljević, M.J.1
-
16
-
-
84947952147
-
Correlation immunity and the summation generator
-
Lecture Notes in Computer Science, H. C. Williams ed., Springer-Verlag
-
R. A. Rueppel, "Correlation immunity and the summation generator," Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, vol. 218, H. C. Williams ed., Springer-Verlag, pp. 260-272, 1986.
-
(1986)
Advances in Cryptology - CRYPTO '85
, vol.218
, pp. 260-272
-
-
Rueppel, R.A.1
-
18
-
-
0021489155
-
Correlation-immunity of nonlinear combining functions for cryptographic applications
-
IT-30, Sep
-
T. Siegenthaler, "Correlation-immunity of nonlinear combining functions for cryptographic applications," IEEE Trans. Inform. Theory, vol. IT-30, pp. 776-780, Sep. 1984.
-
(1984)
IEEE Trans. Inform. Theory
, pp. 776-780
-
-
Siegenthaler, T.1
-
19
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
C-34, Jan
-
T. Siegenthaler, "Decrypting a class of stream ciphers using ciphertext only," IEEE Trans. Comput., vol. C-34, pp. 81-85, Jan. 1985.
-
(1985)
IEEE Trans. Comput.
, pp. 81-85
-
-
Siegenthaler, T.1
-
20
-
-
0024001951
-
A spectral characterization of correlation-immune combining functions
-
IT-34, May
-
G. Z. Xiao and J. L. Massey, "A spectral characterization of correlation-immune combining functions," IEEE Trans. Inform. Theory, vol. IT-34, pp. 569-571, May 1988.
-
(1988)
IEEE Trans. Inform. Theory
, pp. 569-571
-
-
Xiao, G.Z.1
Massey, J.L.2
-
21
-
-
0026219481
-
An algorithm for the initial state reconstruction of the clock-controlled shift register
-
IT-37, Sep
-
M. V. Živković, "An algorithm for the initial state reconstruction of the clock-controlled shift register," IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488-1490, Sep. 1991.
-
(1991)
IEEE Trans. Inform. Theory
, pp. 1488-1490
-
-
Živković, M.V.1
|