-
1
-
-
85034420736
-
The stop-and-go generator
-
Lecture Notes in Computer Science, T. Beth, N. Cot, and I. Ingemarsson eds., Springer-Verlag
-
T. Beth and F. C. Piper, “The stop-and-go generator,” Advances in Cryptology - EUROCRYPT '84, Lecture Notes in Computer Science, vol. 209, T. Beth, N. Cot, and I. Ingemarsson eds., Springer-Verlag, pp. 88-92, 1985.
-
(1985)
Advances in Cryptology - EUROCRYPT '84
, vol.209
, pp. 88-92
-
-
Beth, T.1
Piper, F.C.2
-
2
-
-
0025824847
-
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
-
J. Dj. Golić and M. Mihaljević, “A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance,” Journal of Cryptology, vol. 3(3), pp. 201-212, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, Issue.3
, pp. 201-212
-
-
Golić, J.D.1
Mihaljević, M.2
-
3
-
-
0008772856
-
A generalized correlation attack with a probabilistic constrained edit distance
-
Lecture Notes in Computer Science, R. A. Rueppel ed., Springer-Verlag
-
J. Dj. Golić and S. Petrović, “A generalized correlation attack with a probabilistic constrained edit distance,” Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472-476, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT '92
, vol.658
, pp. 472-476
-
-
Golić, J.D.1
Petrović, S.2
-
4
-
-
84948975118
-
Embedding and probabilistic correlation attacks on clock-controlled shift registers
-
Lecture Notes m Computer Science, A. De Santis ed., Springer-Verlag
-
J. Dj. Golić and L. O'Connor, “Embedding and probabilistic correlation attacks on clock-controlled shift registers,” Advances in Cryptology - EUROCRYPT '94, Lecture Notes m Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 230-243, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT '94
, vol.950
, pp. 230-243
-
-
Golić, J.D.1
O'connor, L.2
-
5
-
-
0030365319
-
Constrained embedding probability for two binary strings
-
J. Dj. Golid, “Constrained embedding probability for two binary strings,” SIAM Journal on Discrete Mathematics, voI. 9(3), pp. 360-364, 1996.
-
(1996)
SIAM Journal on Discrete Mathematics, Voi
, vol.9
, Issue.3
, pp. 360-364
-
-
Golid, J.D.1
-
6
-
-
84947998951
-
Edit distance correlation attacks on clock-controlled combiners with memory
-
J. Pieprzyk ed., Springer-Verlag
-
J. Dj. Golić, “Edit distance correlation attacks on clock-controlled combiners with memory,” Information Security and Privacy, Lecture Notes in Computer Science, vol. 1172, J. Pieprzyk ed., Springer-Verlag, pp. 169-181, 1996.
-
(1996)
Information Security and Privacy, Lecture Notes in Computer Science
, vol.1172
, pp. 169-181
-
-
Golić, J.D.1
-
8
-
-
85034847491
-
Alternating step generators controlled by de Bruijn sequences
-
D. Chaum and W. L. Price eds., Springer-Verlag
-
C. G. Günther, “Alternating step generators controlled by de Bruijn sequences,” Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science, vol. 304, D. Chaum and W. L. Price eds., Springer-Verlag, pp. 5-14, 1988.
-
(1988)
Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science
, vol.304
, pp. 5-14
-
-
Günther, C.G.1
-
9
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
Jan
-
J. L. Massey, “Shift-register synthesis and BCH decoding,” IEEE Trans. Inform. Theory, vol. IT-15, pp. 122-127, Jan. 1969.
-
(1969)
IEEE Trans. Inform. Theory
, vol.IT-15
, pp. 122-127
-
-
Massey, J.L.1
-
10
-
-
3843098329
-
Cryptanalysis of a two-stage Gollmann cascade generator
-
Rome, Italy
-
R. Menicocci, “Cryptanalysis of a two-stage Gollmann cascade generator,” Proceedings of SPRC '93, Rome, Italy, pp. 62-69, 1993.
-
(1993)
Proceedings of SPRC '93
, pp. 62-69
-
-
Menicocci, R.1
-
11
-
-
0346602660
-
On the linear consistency test (LCT) in cryptanalysis with applications
-
G. Brassard ed., Springer-Verlag
-
K. Zeng, C. H. Yang, and T. R. N. Rao, “On the linear consistency test (LCT) in cryptanalysis with applications,” Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science, vol. 435, G. Brassard ed., Springer-Verlag, pp. 164-174, 1990.
-
(1990)
Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science
, vol.435
, pp. 164-174
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.3
-
12
-
-
84955610054
-
An improved linear syndrome algorithm in cryptanalysis with applications
-
A. J. Menezes and S. A. Vanstone eds., Springer-Verlag
-
K. Zeng, C. H. Yang, and T. It. N. Rao, “An improved linear syndrome algorithm in cryptanalysis with applications,” Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone eds., Springer-Verlag, pp. 34-47, 1991.
-
(1991)
Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science
, vol.537
, pp. 34-47
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.I.N.3
-
13
-
-
0026219481
-
An algorithm for the initial state reconstruction of the clockcontrolled shift register
-
M.V. Živković, “An algorithm for the initial state reconstruction of the clockcontrolled shift register,” IEEE Trana. Inform. Theory, vol. IT-37, pp. 1488-1490, Sept. 1991.
-
(1991)
IEEE Trana. Inform. Theory
, vol.IT-37
, pp. 1488-1490
-
-
Živković, M.V.1
|