Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output
Author:
Beighton MatthewORCID,
Bartlett HarryORCID,
Simpson LeonieORCID,
Wong Kenneth Koon-HoORCID
Publisher
Springer Singapore
Reference37 articles.
1. Afzal, M., Masood, A.: Algebraic cryptanalysis of a NLFSR based stream cipher. In: 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, pp. 1–6. IEEE (2008)
2. Amin Ghafari, V., Hu, H.: Fruit-80: a secure ultra-lightweight stream cipher for constrained environments. Entropy 20(3), 180 (2018)
3. Lecture Notes in Computer Science;F Armknecht,2015
4. Lecture Notes in Computer Science;C Berbain,2009
5. Lecture Notes in Computer Science;C Berbain,2006