Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
From MaRDI portal
(Redirected from Publication:451122)
Recommendations
Cites work
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- scientific article; zbMATH DE number 1955779 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- 2-Adic shift registers
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- A Survey of Feedback with Carry Shift Registers
- An Efficient State Recovery Attack on X-FCSR-256
- Breaking the F-FCSR-H Stream Cipher in Real Time
- Fast Software Encryption
- Fast correlation attacks on certain stream ciphers
- Feedback With Carry Shift Registers Synthesis With the Euclidean Algorithm
- Feedback shift registers, 2-adic span, and combiners with memory
- Progress in Cryptology - INDOCRYPT 2004
- Register synthesis for algebraic feedback shift registers based on non-primes
- Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators
- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs
Cited in
(10)- An Efficient State Recovery Attack on X-FCSR-256
- An efficient state recovery attack on the X-FCSR family of stream ciphers
- Breaking the F-FCSR-H Stream Cipher in Real Time
- On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3
- Fast construction of binary ring FCSRs for hardware stream ciphers
- Two Algebraic Attacks Against the F-FCSRs Using the IV Mode
- Cryptanalysis of the F-FCSR Stream Cipher Family
- A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences
- Fast Software Encryption
- scientific article; zbMATH DE number 1759258 (Why is no real title available?)
This page was built for publication: Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q451122)