暂无分享,去创建一个
[1] Hugo Krawczyk,et al. The Shrinking Generator , 1994, CRYPTO.
[2] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[3] Emin Anarim,et al. A Note on the Periodicity and the Output Rate of Bit Search Type Generators , 2007, IEEE Transactions on Information Theory.
[4] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[5] Miodrag J. Mihaljevic. A faster cryptanalysis of the self-shrinking generator , 1996, ACISP.
[6] Aline Gouget,et al. How to Strengthen Pseudo-random Generators by Using Compression , 2006, EUROCRYPT.
[7] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[8] Willi Meier,et al. The Self-Shrinking Generator , 1994, EUROCRYPT.
[9] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[10] Chris J. Mitchell,et al. Analysis of the Bit-Search Generator and Sequence Compression Techniques , 2005, FSE.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[13] Martin Hell,et al. Two New Attacks on the Self-Shrinking Generator , 2006, IEEE Transactions on Information Theory.
[14] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[15] Stefan Lucks,et al. Improved Cryptanalysis of the Self-Shrinking Generator , 2001, ACISP.
[16] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[17] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[18] Solomon W. Golomb,et al. Shift Register Sequences , 1981 .
[19] Aline Gouget,et al. The Bit-Search Generator , 2004 .