Publication:4341730

From MaRDI portal


zbMath0871.94018MaRDI QIDQ4341730

Yishay Mansour, Hugo Krawczyk, Don Coppersmith

Publication date: 18 June 1997



94A55: Shift register sequences and sequences over finite alphabets in information and communication theory

94A60: Cryptography


Related Items

A construction of primitive polynomials over finite fields, Joint Hardware / Software Design of a Fast Stream Cipher, Chaotic Cellular Automata with Cryptographic Application, Construction of primitive polynomials over finite fields, Side Channel Attacks on Irregularly Decimated Generators, Reduced Complexity Attacks on the Alternating Step Generator, Side channel cryptanalysis of product ciphers, Modelling the shrinking generator in terms of linear CA, Related key chosen IV attacks on Decim v2 and Decim-128., Analysis of the generalized self-shrinking generator, Self-shrinking chaotic stream ciphers, Synthesis of cryptographic interleaved sequences by means of linear cellular automata, On the use of cellular automata in symmetric cryptography, Modelling nonlinear sequence generators in terms of linear cellular automata, A simple attack on some clock-controlled generators, Randomness quality of permuted pseudorandom binary sequences, Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator, Shrinking generators and statistical leakage, Shrinking generators based on \(\sigma \)-LFSRs, Linear complexity of generalized sequences by comparison of PN-sequences, Strategic attack on the shrinking generator, Discrete linear models for the generalized self-shrunken sequences, Generalization of the Self-Shrinking Generator in the Galois Field, О подпоследовательностях марковских последовательностей, Fault attack on the balanced shrinking generator, Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators, Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator, Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations, Nonlinear Pseudorandom Sequences Based on 90/150 LHGCA, How to Strengthen Pseudo-random Generators by Using Compression, An Improved Fast Correlation Attack on Stream Ciphers