The LILI-128 Keystream Generator
暂无分享,去创建一个
[1] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[2] G. R. BLAKLEY,et al. A necessary and sufficient condition for fundamental periods of cascade machines to be products of the fundamental periods of their constituent finite state machines , 1981, Inf. Sci..
[3] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[4] Jovan Dj. Golic,et al. On the linear complexity of nonuniformly decimated PN-sequences , 1988, IEEE Trans. Inf. Theory.
[5] F. A. Seiler,et al. Numerical Recipes in C: The Art of Scientific Computing , 1989 .
[6] Chung-Huang Yang,et al. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.
[7] Cunsheng Ding,et al. The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.
[8] Miodrag V. Zivkovic. An algorithm for the initial state reconstruction of the clock-controlled shift register , 1991, IEEE Trans. Inf. Theory.
[9] Jovan Dj. Golic,et al. A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance , 1992, EUROCRYPT.
[10] Jovan Dj. Golic,et al. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers , 1994, EUROCRYPT.
[11] Ross J. Anderson. Searching for the Optimum Correlation Attack , 1994, FSE.
[12] Jovan Dj. Golic. On the Security of Nonlinear Filter Generators , 1996, FSE.
[13] Jovan Dj. Golic,et al. Fast Correlation Attacks and Multiple Linear Approximations , 1997, ACISP.
[14] Leonie Ruth Simpson,et al. A Probabilistic Correlation Attack on the Shrinking Generator , 1998, ACISP.
[15] William Millan,et al. Cryptanalysis of ORYX , 1998, Selected Areas in Cryptography.
[16] Greg Rose. A Stream Cipher Based on Linear Feedback over GF(28) , 1998, ACISP.
[17] Divide and conquer attacks on shift register based stream ciphers , 2000 .
[18] Palash Sarkar,et al. Nonlinearity Bounds and Constructions of Resilient Boolean Functions , 2000, CRYPTO.
[19] William Millan,et al. LILI Keystream Generator , 2000, Selected Areas in Cryptography.