LILI Keystream Generator
暂无分享,去创建一个
William Millan | Leonie Ruth Simpson | Ed Dawson | Jovan Dj. Golic | E. Dawson | J. Golic | W. Millan | L. Simpson
[1] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[2] G. R. BLAKLEY,et al. A necessary and sufficient condition for fundamental periods of cascade machines to be products of the fundamental periods of their constituent finite state machines , 1981, Inf. Sci..
[3] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[4] Jovan Dj. Golic,et al. On the linear complexity of nonuniformly decimated PN-sequences , 1988, IEEE Trans. Inf. Theory.
[5] Chung-Huang Yang,et al. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.
[6] Cunsheng Ding,et al. The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.
[7] Miodrag V. Zivkovic. An algorithm for the initial state reconstruction of the clock-controlled shift register , 1991, IEEE Trans. Inf. Theory.
[8] Jovan Dj. Golic,et al. A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance , 1992, EUROCRYPT.
[9] Jovan Dj. Golic,et al. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers , 1994, EUROCRYPT.
[10] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[11] Ross J. Anderson. Searching for the Optimum Correlation Attack , 1994, FSE.
[12] Jovan Dj. Golic. On the Security of Nonlinear Filter Generators , 1996, FSE.
[13] Jovan Dj. Golic,et al. Fast Correlation Attacks and Multiple Linear Approximations , 1997, ACISP.
[14] Leonie Ruth Simpson,et al. A Probabilistic Correlation Attack on the Shrinking Generator , 1998, ACISP.
[15] William Millan,et al. Cryptanalysis of ORYX , 1998, Selected Areas in Cryptography.
[16] Greg Rose. A Stream Cipher Based on Linear Feedback over GF(28) , 1998, ACISP.
[17] Sarvar Patel,et al. SOBER Crytanalysis , 1999, FSE.
[18] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[19] Divide and conquer attacks on shift register based stream ciphers , 2000 .
[20] Palash Sarkar,et al. Nonlinearity Bounds and Constructions of Resilient Boolean Functions , 2000, CRYPTO.
[21] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[22] Rainer A. Rueppel. Advances in Cryptology — EUROCRYPT’ 92 , 2001, Lecture Notes in Computer Science.