Cryptanalysts representation of nonlinearly filtered ML-sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Linear complexity and random sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Correlation properties of combiners with memory in stream ciphers
Journal of Cryptology - Eurocrypt '90
Correlation Immunity and the Summation Generator
CRYPTO '85 Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Cryptoanalysis Based on 2-Adic Rational Approximation
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Fast Software Encryption, Cambridge Security Workshop
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
Proceedings of the 2002 international symposium on Symbolic and algebraic computation
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes
Designs, Codes and Cryptography
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Arithmetic crosscorrelations of feedback with carry shift register sequences
IEEE Transactions on Information Theory
Fibonacci and Galois representations of feedback-with-carry shift registers
IEEE Transactions on Information Theory
Feedback with carry shift registers synthesis with the Euclidean algorithm
IEEE Transactions on Information Theory
New Stream Cipher Designs
Entropy of the Internal State of an FCSR in Galois Representation
Fast Software Encryption
Parallel Generation of l-Sequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
A note on the crosscorrelation of maximal length FCSR sequences
Designs, Codes and Cryptography
X-FCSR: a new software oriented stream cipher based upon FCSRs
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Design of a novel pseudo-random generator based on vectorial FCSRs
WISA'10 Proceedings of the 11th international conference on Information security applications
A matrix approach for FCSR automata
Cryptography and Communications
Two algebraic attacks against the F-FCSRs using the IV mode
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Computing the k-error N-adic complexity of a sequence of period pn
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On the distinctness of decimations of generalized l-sequences
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Hi-index | 14.98 |
Feedback with carry shift registers (FCSR) was introduced by Goresky and Klapper in 1993. It is similar to the classical linear feedback shift registers (LFSR) used in many pseudorandom generators. The main difference is that the elementary additions are not additions modulo 2 but with propagation of carries. The main problem for the use of an FCSR automaton is the fact that the generated sequences are predictable. In order to remove this weakness of FCSR-based generators, we propose filtering the state of the FCSR with a linear function. This method is efficient since the FCSR structure is not related to a linear property. This paper presents an extensive study of FCSR automata, a security analysis of our generator (concerning linear and 2-adic cryptanalysis, algebraic attack, correlation attack, etc.), and a practical example of parameters in order to design this generator. An important point concerning this generator is the fact that it is simple and efficient, both in hardware and software implementation.