Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach
暂无分享,去创建一个
[1] Jovan Dj. Golic,et al. A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction , 1991, EUROCRYPT.
[2] Jovan Dj. Golic,et al. Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence , 1992, EUROCRYPT.
[3] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[4] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[5] Tsutomu Matsumoto,et al. Incidence structures for key sharing , 1995 .
[6] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[7] Miodrag J. Mihaljevic,et al. A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function , 1994, ASIACRYPT.
[8] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '90 , 1990, Lecture Notes in Computer Science.
[9] Jovan Dj. Golic,et al. A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence , 1990, AUSCRYPT.
[10] P. Pal Chaudhuri,et al. Efficient characterisation of cellular automata , 1990 .
[11] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[12] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.
[13] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[14] Parimal Pal Chaudhuri,et al. Vector Space Theoretic Analysis of Additive Cellular Automata and Its Application for Pseudoexhaustive Test Pattern Generation , 1993, IEEE Trans. Computers.