Author:
Cardell Sara D.,Fúster-Sabater Amparo,Bin Li
Publisher
Springer International Publishing
Reference19 articles.
1. Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Advances in Cryptology – CRYPTO 1993. Lecture Notes in Computer Science, vol. 773, pp. 23–39. Springer (1993)
2. Ekdahl, P., Johansson, T.: Predicting the shrinking generator with fixed connections. In: Advances in Cryptology-EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656, pp. 330–344. Springer, Berlin (2003)
3. Lecture Notes in Computer Science;B Zhang,2005
4. Golić, J.D.: Embedding and probabilistic correlation attacks on clock-controlled shift registers. In: Advances in Cryptology-EUROCRYPT 1994. Lecture Notes in Computer Science, vol. 950, 230–243. Springer, Berlin (1994)
5. Molland, H.: Improved linear consistency attack on irregular clocked keystream generators. In: Fast Software Encryption-FSE 2004. Lecture Notes in Computer Science, vol. 3017, pp. 109–126. Springer (2004)