Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Pseudorandom Bit Generators in Stream-Cipher Cryptography
Computer - Special issue on cryptography
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Generating De Bruijn Sequences: An Efficient Implementation
IEEE Transactions on Computers
Pseudorandomness and Cryptographic Applications
Pseudorandomness and Cryptographic Applications
Shift Register Sequences
Synthesis of minimal cost nonlinear feedback shift registers
Signal Processing
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Design and study of a strong crypto-system model for e-Commerce
ICCC '02 Proceedings of the 15th international conference on Computer communication
Modified Alternating$$\vec{k}$$--generators
Designs, Codes and Cryptography
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security
On analysis and synthesis of (n, k)-non-linear feedback shift registers
Proceedings of the conference on Design, automation and test in Europe
Open problems related to algebraic attacks on stream ciphers
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Fibonacci and Galois representations of feedback-with-carry shift registers
IEEE Transactions on Information Theory
Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations
IEEE Transactions on Information Theory
An algorithm for constructing a fastest Galois NLFSR generating a given sequence
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Synthesis of parallel binary machines
Proceedings of the International Conference on Computer-Aided Design
Searching short recurrences of nonlinear shift registers via directed acyclic graphs
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
An improved hardware implementation of the grain-128a stream cipher
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 754.90 |
Conventional nonlinear feedback shift registers (NLFSRs) use the Fibonacci configuration in which the feedback is applied to the last bit only. In this paper, we show how to transform a Fibonacci NLFSR into an equivalent NLFSR in the Galois configuration, in which the feedback can be applied to every bit. Such a transformation can potentially reduce the depth of the circuits implementing feedback functions, thus decreasing the propagation time and increasing the throughput.