An improved attack on clock-controlled shift registers based on hardware implementation
暂无分享,去创建一个
[1] Andrey Bogdanov,et al. A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) , 2006, 2006 14th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[2] Christof Paar,et al. Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker , 2006, CHES.
[3] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[4] Jörg Keller. Efficient Sampling of the Structure of Crypto Generators’ State Transition Graphs , 2007 .
[5] Guang Zeng,et al. A trinomial type of σ-LFSR oriented toward software implementation , 2008, Science in China Series F: Information Sciences.
[6] Jovan Dj. Golic,et al. Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.
[7] R. Butkutė. Thesis for the Master's degree in Molecular Biosciences Main field of study in Molecular Biology , 2008 .
[8] Matthias Krause. BDD-Based Cryptanalysis of Keystream Generators , 2002, EUROCRYPT.
[9] ZhenYu Hu,et al. Ciphertext verification security of symmetric encryption schemes , 2009, Science in China Series F: Information Sciences.
[10] Jovan Dj. Golic. Cryptanalysis of three mutually clock-controlled stop/go shift registers , 2000, IEEE Trans. Inf. Theory.
[11] Zeng Guang,et al. A trinomial type of σ -LFSR oriented toward software implementation , 2007 .