Analysis and design of stream ciphers
Analysis and design of stream ciphers
Linear ciphers and random sequence generators with multiple clocks
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Lock-in effect in cascades of clock-controlled shift-registers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Inferring sequences produced by pseudo-random number generators
Journal of the ACM (JACM)
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Shift Register Sequences
On the Linear Syndrome Method in Cryptoanalysis
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Large Primes in Stream Cipher Cryptography
AUSCRYPT '90 Proceedings of the International Conference on Cryptology: Advances in Cryptology
How to break Gifford's cipher (extended abstract)
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Design and study of a strong crypto-system model for e-Commerce
ICCC '02 Proceedings of the 15th international conference on Computer communication
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
On analysis and synthesis of (n, k)-non-linear feedback shift registers
Proceedings of the conference on Design, automation and test in Europe
Pseudo-random sequence generators based on cellular automata and bent functions
WSEAS Transactions on Computer Research
Analyzing a class of pseudo-random bit generator through inductive machine learning paradigm
Intelligent Data Analysis
A transformation from the Fibonacci to the Galois NLFSRs
IEEE Transactions on Information Theory
How to speed-up your NLFSR-based stream cipher
Proceedings of the Conference on Design, Automation and Test in Europe
A novel stream cipher for cryptographic applications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Synthesis of parallel binary machines
Proceedings of the International Conference on Computer-Aided Design
Designing stream cipher systems using genetic programming
LION'05 Proceedings of the 5th international conference on Learning and Intelligent Optimization
Digital chaotic noise using tent map without scaling and discretization process
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Short Communication: Stream ciphers for GSM networks
Computer Communications
Hi-index | 0.06 |
Progress in the design and analysis of pseudorandom bit generators over the last decade is surveyed. Background information is provided, and the linear feedback shift registers that serve as building blocks for constructing the generators are examined. Three methods for attacking keystream generators are reviewed, and three techniques for designing them are considered, focusing on how they fail or how their weakness is exposed under the attacks previously described. These techniques are nonlinear feedforward transformation, step control, and multiclocking.