Introduction to finite fields and their applications
Introduction to finite fields and their applications
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Shift Register Sequences
A Probabilistic Correlation Attack on the Shrinking Generator
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
On the Security of Shift Register Based Keystream Generators
Fast Software Encryption, Cambridge Security Workshop
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Linearization of stream ciphers by means of concatenated automata
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Hi-index | 0.00 |
A system related to the shrinking generator that is made up of two feedback shift registers in which one (FSR A) controls the clocking of the other (FSR B) is introduced. It is established that if FSR A generates an m-sequence of period (2m -1) and FSR B generates a de Bruijn sequence of period 2η, then the output sequence of the system has period P = 2m+η-1, linear complexity L bounded from below by 2m+η-2, good statistical properties, and it is secure against correlation attacks. All these properties make it a suitable crypto-generator for stream cipher applications.