A Transformation From the Fibonacci to the Galois NLFSRs
暂无分享,去创建一个
[1] Johannes Mykkeltveit,et al. On the Cycle Structure of Some Nonlinear Shift Register Sequences , 1979, Inf. Control..
[2] Johannes Mykkeltveit. Nonlinear Recurrences and Arithmetic Codes , 1977, Inf. Control..
[3] Avishai Wool,et al. Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's , 2006, ISC.
[4] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[5] Fred S. Annexstein. Generating De Bruijn Sequences: An Efficient Implementation , 1997, IEEE Trans. Computers.
[6] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[7] Anne Canteaut,et al. Open Problems Related to Algebraic Attacks on Stream Ciphers , 2005, WCC.
[8] Mark Goresky,et al. Fibonacci and Galois representations of feedback-with-carry shift registers , 2002, IEEE Trans. Inf. Theory.
[9] Alexander Maximov,et al. Some Words on Cryptanalysis of Stream Ciphers , 2006 .
[10] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[11] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[12] Jovan Dj. Golic,et al. On the linear complexity of functions of periodic GF(q) sequences , 1989, IEEE Trans. Inf. Theory.
[13] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[14] Chung-Huang Yang,et al. Pseudorandom bit generators in stream-cipher cryptography , 1991, Computer.
[15] Hannu Tenhunen,et al. On Analysis and Synthesis of (n,k)-Non-Linear Feedback Shift Registers , 2008, 2008 Design, Automation and Test in Europe.
[16] Nicholas Kalouptsidis,et al. Synthesis of minimal cost nonlinear feedback shift registers , 2002, 2002 11th European Signal Processing Conference.
[17] Rainer Göttfert,et al. An NLFSR-based stream cipher , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[18] Fred Piper,et al. Stream Ciphers , 1982, EUROCRYPT.
[19] H. Fredricksen. A Survey of Full Length Nonlinear Shift Register Cycle Algorithms , 1982 .
[20] Hu Chuan-Gan,et al. On The Shift Register Sequences , 2004 .
[21] Bernhard Löhlein. Attacks based on Conditional Correlations against the Nonlinear Filter Generator , 2003, IACR Cryptol. ePrint Arch..
[22] Rafal Bialota,et al. Modified Alternating $$\vec{k}$$–generators , 2005, Des. Codes Cryptogr..
[23] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[24] William Millan,et al. Dragon: A Fast Word Based Stream Cipher , 2004, ICISC.
[25] Oliver Kniffler,et al. Achterbahn-128 / 80 : Design and Analysis , 2007 .
[26] Yuriy Tarannikov. New Constructions of Resilient Boolean Functions with Maximal Nonlinearity , 2001, FSE.
[27] Grzegorz Kawa. Modified Alternating k-generators , 2005 .
[28] Benjamin Gittins,et al. A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512 , 2005, IACR Cryptol. ePrint Arch..
[29] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[30] J. Stokłosa,et al. Boolean feedback functions for full-length nonlinear shift registers , 2004 .
[31] C.J.A. Jansen,et al. Investigations on nonlinear streamcipher systems: construction and evaluation methods , 1989 .
[32] M. J. Al-Mushrafi,et al. Design and study of a strong crypto-system model for e-Commerce , 2002 .
[33] Eli Biham,et al. Cryptanalysis of the A5/1 GSM Stream Cipher , 2000, INDOCRYPT.