Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Correlation Immunity and the Summation Generator
CRYPTO '85 Advances in Cryptology
Design and analysis of a highly secure stream cipher based on linear feedback shift register
Computers and Electrical Engineering
Linear feedback shift register based stream ciphers
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Hi-index | 14.98 |
A concept of constrained many-to-one string edit distances, with or without memory, based on edit operations of deletion and substitution is introduced, and the recursive algorithms for their efficient computation are derived. Their use for correlation attacks on clock-controlled shift register based keystream generators is proposed, the divide and conquer effect is examined, and the generalized reducibility property of functions with memory is pointed out as a design criterion.