Cryptography with shrinking generators. Fundamentals and applications of keystream sequence generators based on irregular decimation
DOI10.1007/978-3-030-12850-0zbMATH Open1503.94003OpenAlexW4232933717MaRDI QIDQ4625846FDOQ4625846
Authors: Sara Díaz Cardell, Amparo Fúster-Sabater
Publication date: 25 February 2019
Published in: SpringerBriefs in Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-12850-0
Recommendations
- Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
- Recovering decimation-based cryptographic sequences by means of linear CAs
- Discrete linear models for the generalized self-shrunken sequences
- On the security of shift register based keystream generators
- Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cellular automata (computational aspects) (68Q80)
Cited In (2)
This page was built for publication: Cryptography with shrinking generators. Fundamentals and applications of keystream sequence generators based on irregular decimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4625846)