Security analysis of linearly filtered NLFSRs
暂无分享,去创建一个
Ron Steinfeld | Josef Pieprzyk | Harry Bartlett | Mohammad Ali Orumiehchiha | J. Pieprzyk | Ron Steinfeld | Harry Bartlett | M. A. Orumiehchiha
[1] Adi Shamir,et al. Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..
[2] Alexander Maximov. Cryptanalysis of the "Grain" family of stream ciphers , 2006, ASIACCS '06.
[3] Ingrid Verbauwhede,et al. SFINKS: A synchronous stream cipher for restricted hardware environments , 2005 .
[4] V. F. Kolchin,et al. Random Graphs: Contents , 1998 .
[5] Guang Gong,et al. WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..
[6] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.
[7] Jovan Dj. Golic,et al. Intrinsic Statistical Weakness of Keystream Generators , 1994, ASIACRYPT.
[8] Antoine Joux,et al. Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers , 2008, Selected Areas in Cryptography.
[9] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[10] Elena Dubrova,et al. A List of Maximum Period NLFSRs , 2012, IACR Cryptol. ePrint Arch..
[11] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[12] Guang Gong,et al. A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[13] Shuhong Gao,et al. Random Krylov Spaces over Finite Fields , 2003, SIAM J. Discret. Math..
[14] Frederik Armknecht,et al. Improving Fast Algebraic Attacks , 2004, FSE.
[15] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[16] Ed Dawson,et al. Generalized Inversion Attack on Nonlinear Filter Generators , 2000, IEEE Trans. Computers.
[17] Ron Steinfeld,et al. Cryptanalysis of WG-7: a lightweight stream cipher , 2012, Cryptography and Communications.
[18] Rainer Göttfert,et al. Linear Filtering of Nonlinear Shift-Register Sequences , 2005, WCC.
[19] Tor Helleseth,et al. A Survey of Recent Attacks on the Filter Generator , 2007, AAECC.
[20] Philip Hawkes,et al. Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers , 2004, CRYPTO.
[21] Jovan Dj. Golic,et al. Correlation via Linear Sequential Circuit Approximation of Combiners with memory , 1992, EUROCRYPT.
[22] Walter T. Penzhorn,et al. Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes , 1996, FSE.
[23] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[24] Solomon W. Golomb,et al. Shift Register Sequences , 1981 .