-
2
-
-
33747701455
-
A Necessary and Sufficient Condition for Fundamental Periods of Cascade Machines to be Products of the Fundamental Periods of their Constituent Finite State Machines
-
G. R. Blakley and G. B. Purdy. A Necessary and Sufficient Condition for Fundamental Periods of Cascade Machines to be Products of the Fundamental Periods of their Constituent Finite State Machines. Information Sciences, vol. 24, pp. 71–91, 1981
-
(1981)
Information Sciences
, vol.24
, pp. 71-91
-
-
Blakley, G.R.1
Purdy, G.B.2
-
5
-
-
0024078742
-
On the Linear Complexity of Nonuniformly Decimated PN–Sequences
-
J. Dj. Golić and M. ˇZivković. On the Linear Complexity of Nonuniformly Decimated PN–Sequences. IEEE Trans. Inform. Theory, vol. IT-34, pp. 1077–1079, 1988
-
(1988)
IEEE Trans. Inform. Theory
, vol.IT-34
, pp. 1077-1079
-
-
Golić, J.D.1
ˇzivković, M.2
-
6
-
-
0025824847
-
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance
-
J. Dj. Golić and M. J. Mihaljević. A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journalof Cryptology, vol. 3(3), pp. 201–212, 1991
-
(1991)
Journalof Cryptology
, vol.3
, Issue.3
, pp. 201-212
-
-
Golić, J.D.1
Mihaljević, M.J.2
-
10
-
-
84937740421
-
Shift-Register Synthesis and BCH Decoding
-
Jan
-
J. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Trans. Inform. Theory, vol. IT-15, pp. 122–127, Jan. 1969
-
(1969)
IEEE Trans. Inform. Theory
, vol.IT-15
, pp. 122-127
-
-
Massey, J.1
-
11
-
-
0024860262
-
Fast Correlation Attacks on Certain Stream Ciphers
-
W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journalof Cryptology, vol. 1(3), pp. 159–167, 1989
-
(1989)
Journalof Cryptology
, vol.1
, Issue.3
, pp. 159-167
-
-
Meier, W.1
Staffelbach, O.2
-
14
-
-
84947420109
-
Fast Correlation Attacks and Multiple Linear Approximations
-
Springer–Verlag
-
M. Salmasizadeh, L. Simpson, J. Dj. Golić and E. Dawson. Fast Correlation Attacks and Multiple Linear Approximations. In Information Security and Privacy -Nepean ’97, volume 1270 of Lecture Notes in Computer Science, pages 228–239. Springer–Verlag, 1997
-
(1997)
Information Security and Privacy -Nepean ’97, Volume 1270 of Lecture Notes in Computer Science
, pp. 228-239
-
-
Salmasizadeh, M.1
Simpson, L.2
Golić, J.D.3
Dawson, E.4
-
16
-
-
0021786321
-
Decrypting a Class of Stream Ciphers Using Ciphertext Only
-
T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers, vol. C-34(1), pp. 81–85, 1985
-
(1985)
IEEE Trans. Computers
, vol.C-34
, Issue.1
, pp. 81-85
-
-
Siegenthaler, T.1
-
18
-
-
84928973217
-
-
PhD thesis, Information Security Research Centre, Queensland University of Technology, Brisbane, Australia, November
-
L. Simpson. Divide and Conquer Attacks on Shift Register Based Stream Ciphers. PhD thesis, Information Security Research Centre, Queensland University of Technology, Brisbane, Australia, November 1999
-
(1999)
Divide and Conquer Attacks on Shift Register Based Stream Ciphers
-
-
Simpson, L.1
-
19
-
-
84949306247
-
-
TIA TR45. 0. A, Common Cryptographic Algorithms. Telecommunications Industry Association, Vienna V A., USA, June, Rev B
-
TIA TR45. 0. A, Common Cryptographic Algorithms. Telecommunications Industry Association, Vienna V A., USA, June 1995, Rev B
-
(1995)
-
-
-
20
-
-
24944453996
-
Cryptanalysis of ORYX
-
Springer–Verlag
-
D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan and B. Schneier. Cryptanalysis of ORYX. In Proceedings of the Fifth AnnualWorkshop on Selected Areas in Cryptography -SAC ’98, volume 1556 of Lecture Notes in Computer Science, pages 296–305. Springer–Verlag, 1998
-
(1998)
Proceedings of the Fifth Annualworkshop on Selected Areas in Cryptography -SAC ’98, Volume 1556 of Lecture Notes in Computer Science
, pp. 296-305
-
-
Wagner, D.1
Simpson, L.2
Dawson, E.3
Kelsey, J.4
Millan, W.5
Schneier, B.6
-
22
-
-
0026219481
-
An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register
-
Sept
-
M. Żivković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept. 1991
-
(1991)
IEEE Trans. Inform. Theory
, vol.IT-37
, pp. 1488-1490
-
-
Żivković, M.1
|