Analysis and design of stream ciphers
From MaRDI portal
cryptographyknapsackcorrelation immunityrandom sequencesstream cipherslinear feedback shift registersmultiple clocking
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Recommendations
Cited in
(only showing first 100 items - show all)- Modified Berlekamp-Massey Algorithm for Approximating the k-Error Linear Complexity of Binary Sequences
- Reducing the calculation of the linear complexity of \(u_2^v\)-periodic binary sequences to Games-Chan algorithm
- Cryptographic transformations of non-Shannon sources of information
- The structured design of cryptographically good s-boxes
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- A combinatorial approach to probabilistic results on the linear- complexity profile of random sequences
- Occurrence numbers for vectors in cycles of output sequences of binary combining generators
- A note on a conjecture concerning symmetric resilient functions
- Lattice basis reduction algorithms and multi-dimensional continued fractions
- Factorization of determinants over finite fields and application in stream ciphers
- On the distinctness of primitive sequences over \({\mathbb Z}/(p^{e}q)\) modulo 2
- The sum of modules of Walsh coefficients of Boolean functions
- Cross-correlations of linearly and quadratically related geometric sequences and GMW sequences
- Cryptanalysis of an E0-like combiner with memory
- Distribution of one-error linear complexity of binary sequences for arbitrary prime period
- Periods Distribution in the Linear Feedback Generalized Registers
- On the linear complexity of FCSR sequences
- scientific article; zbMATH DE number 5005270 (Why is no real title available?)
- An analysis of a class of algorithms for \(S\)-box construction
- Counting functions and expected values for the lattice profile at \(n\)
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- Period distribution of generalized discrete Arnold cat map
- Joint linear complexity of multisequences consisting of linear recurring sequences
- Characterization of \(2^{n}\)-periodic binary sequences with fixed 2-error or 3-error linear complexity
- Remarks on the \(k\)-error linear complexity of \(p^n\)-periodic sequences
- On evaluating the linear complexity of a sequence of least period \(2^ n\)
- Algebraic nonlinearity and its applications to cryptography
- Correlation properties of combiners with memory in stream ciphers
- Revisiting Correlation-Immunity in Filter Generators
- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
- Cryptanalysis of a chaotic stream cipher and its improved scheme
- 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity for k = 2 or 3
- The \(k\)-error linear complexity distribution for \(2^n\)-periodic binary sequences
- Correlation properties of a general binary combiner with memory
- The stability theory of stream ciphers
- On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
- On the \(k\)-error linear complexity of binary sequences derived from the discrete logarithm in finite fields
- An algorithm for computing the error sequence of \(p^{n}\)-periodic binary sequences
- Counting functions and expected values for the \(k\)-error linear complexity
- Linear complexity and correlation of a class of binary cyclotomic sequences
- Generalized Joint Linear Complexity of Linear Recurring Multisequences
- Feedback shift registers, 2-adic span, and combiners with memory
- A simple stream cipher with proven properties
- Asymptotic analysis on the normalized \(k\)-error linear complexity of binary sequences
- A family of elliptic curve pseudorandom binary sequences
- On the \(k\)-error linear complexity of subsequences of \(d\)-ary Sidel'nikov sequences over prime field \(\mathbb{F}_d\)
- Structure analysis on the \(k\)-error linear complexity for \(2^n\)-periodic binary sequences
- Statistical weakness of multiplexed sequences
- Attacks against filter generators exploiting monomial mappings
- On the linear complexity of product sequences of linear recurring sequences
- Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials
- Binary Pseudo-Random Sequences Theory
- Enumerating Boolean functions of cryptographic significance
- Linear complexity of periodic sequences: a general theory
- A kind of quaternary sequences of period \(2 p^m q^n\) and their linear complexity
- FREQUENCY CHARACTERISTICS OF CYCLES IN OUTPUT SEQUENCES GENERATED BY COMBINING GENERATORS OVER THE FIELD OF TWO ELEMENTS
- The minimal polynomial over \(\mathbb F_q\) of linear recurring sequence over \(\mathbb F_{q^m}\)
- Parameterized hash functions
- Expansion complexity and linear complexity of sequences over finite fields
- An iterative algorithm for parametrization of shortest length linear shift registers over finite chain rings
- scientific article; zbMATH DE number 1996484 (Why is no real title available?)
- Further results on the distinctness of modulo 2 reductions of primitive sequences over \(\mathbb{Z}/(2^{32}-1)\)
- Enumeration results on the joint linear complexity of multisequences
- On distribution properties of sequences with perfect linear complexity profile
- Fast correlation attacks on certain stream ciphers
- Improved results on the probabilistic theory of the joint linear complexity of multisequences
- Three characterizations of non-binary correlation-immune and resilient functions
- Fixed points of the subset sum pseudorandom number generators
- On the \(k\)-error linear complexity for \(p^n\)-periodic binary sequences via hypercube theory
- Improved differential attacks on RC5
- Parallel Generation of ℓ-Sequences
- Randomness and Representation of Span n Sequences
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- Linear complexity of second order PN_sequences addition with single order PN_sequence in nonlinear filter generator
- scientific article; zbMATH DE number 7310272 (Why is no real title available?)
- The Fourier spectral characterization for the correlation-immune functions over \(\mathbb{F}_p \)
- Dangerous Functions for Feedforward Pseudo-Noise Generators with Memory
- A Survey of Recent Attacks on the Filter Generator
- Analysis of periodic linear systems over finite fields with and without Floquet transform
- From Bi-ideals to Periodicity
- Determining periodicity: a case study of a functional specification
- Attacks on the ESA-PSS-04-151 MAC Scheme
- New concepts and construction of quantum random number generators
- Linear span analysis of a set of periodic sequence generators
- An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG
- AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
- On linear representation, complexity and inversion of maps over finite fields
- Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators
- Spectral characteristics of the best affine approach of multi-output m-valued logical functions
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Decimation and interleaving operations in one-sided symbolic dynamics
- Oblivious DFA evaluation on joint input and its applications
- On the multidimensional distribution of the subset sum generator of pseudorandom numbers
- Stream Ciphering Techniques Based on n-Tuples Juxtaposition Sequences
- Cryptanalysis of the knapsack generator
- Boolean functions: degree and support
- On ideal \(t\)-tuple distribution of orthogonal functions in filtering de Bruijn generators
- On some properties of the curvature and nondegeneracy of Boolean functions
- Sequences, DFT and Resistance against Fast Algebraic Attacks
- Semiconductor Emitters in Entropy Sources for Quantum Random Number Generation
This page was built for publication: Analysis and design of stream ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1089307)