Introduction to finite fields and their applications
Introduction to finite fields and their applications
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
On the linear consistency test (LCT) in cryptanalysis with applications
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Shift Register Sequences
A fast correlation attack on LILI-128
Information Processing Letters
A faster cryptanalysis of the self-shrinking generator
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Edit Distance Correlation Attack on the Alternating Step Generator
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
BDD-Based Cryptanalysis of Keystream Generators
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On the Security of Shift Register Based Keystream Generators
Fast Software Encryption, Cambridge Security Workshop
Cryptanalysis of Stream Ciphers with Linear Masking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Geo-encryption protocol for mobile networks
Computer Communications
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
On Effectiveness of Clock Control in Stream Ciphers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On the implementation of security policies with adaptative encryption
Computer Communications
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
On the efficiency of the clock control guessing attack
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Predicting the shrinking generator with fixed connections
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On the security of the LILI family of stream ciphers against algebraic attacks
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Some attacks on the bit-search generator
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Improved linear distinguishers for SNOW 2.0
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
IEEE Transactions on Information Theory
Short Communication: Stream ciphers for GSM networks
Computer Communications
Clock-controlled shift registers: a review
IEEE Journal on Selected Areas in Communications
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Hi-index | 0.24 |
In this paper, we propose a class of binary keystream generators, called modified clock-controlled alternating step generators, and referred to as ΩK, intended for hardware implementation. This class belongs to the family of clock-controlled generators, and is related to the class of alternating step generators (ASG). Two distinct subclasses of ΩK are investigated in details, namely mixed and linear generators. ΩK has been designed to produce keystreams with guaranteed randomness properties such as long period, high linear complexity and nice statistical distribution properties. The resistance of the proposed generators to well-known cryptanalytic attacks is investigated. Furthermore, the irregular clocking introduced is shown to provide a certain level of strengthened security against several cryptanalytic attacks. Finally, a hardware implementation of a generator of ΩK is provided.