
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Jovan Dj. Golic, "Linear Models for Keystream Generators," IEEE Transactions on Computers, vol. 45, no. 1, pp. 4149, January, 1996.  
BibTex  x  
@article{ 10.1109/12.481485, author = {Jovan Dj. Golic}, title = {Linear Models for Keystream Generators}, journal ={IEEE Transactions on Computers}, volume = {45}, number = {1}, issn = {00189340}, year = {1996}, pages = {4149}, doi = {http://doi.ieeecomputersociety.org/10.1109/12.481485}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  Linear Models for Keystream Generators IS  1 SN  00189340 SP41 EP49 EPD  4149 A1  Jovan Dj. Golic, PY  1996 KW  Clockcontrolled shift registers KW  correlation coefficients KW  cryptography KW  keystream generators KW  linear models. VL  45 JA  IEEE Transactions on Computers ER   
Abstract—It is shown that an arbitrary binary keystream generator with
[1] R.J. Anderson,"Solving a class of stream ciphers," Crytologia, vol. 14, no. 3, pp. 285288, 1990.
[2] W.G. Chambers and D. Gollmann,"Lockin effect in cascades of clockcontrolled shift registers," Proc. Advances in Cryptology—EUROCRYPT '88, Lecture Notes in Computer Science, vol. 330, C.G. Günther, ed., pp. 331342. SpringerVerlag, 1991.
[3] V. Chepyzhov and B. Smeets,"On a fast correlation attack on stream ciphers," Proc. Advances in Cryptology—EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, D.V. Davies, ed., pp. 176185. SpringerVerlag, 1991.
[4] D. Coppersmith,H. Krawczyk, and Y. Mansour,"The shrinking generator," Proc. Advances in CryptologyCRYPTO '93, Lecture Notes in Computer Science, vol. 773, D.R. Stinson, ed., pp. 2239. SpringerVerlag, 1994.
[5] R.G. Gallager,"Lowdensity paritycheck codes," IRE Trans. Information Theory, vol. 8, pp. 2128, Jan. 1962.
[6] J.Dj. Golic and M.V. Zivkovic,"On the linear complexity of nonuniformly decimated PNsequences," IEEE Trans. Information Theory, vol. 34, pp. 1,0771,079, Sept. 1988.
[7] J.Dj. Golic and M.J. Mihaljevic,"A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance," J. Cryptology, vol. 3, no. 3, pp. 201212, 1991.
[8] J.Dj. Golic,"Correlation via linear sequential circuit approximation of combiners with memory," Proc. Advances in Cryptology—EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R.A. Rueppel, ed., pp. 113123. SpringerVerlag, 1993.
[9] J.Dj. Golic and S.V. Petrovic,"A generalized correlation attack with a probabilistic constrained edit distance," Proc. Advances in Cryptology—EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R.A. Rueppel, ed., pp. 472476. SpringerVerlag, 1993.
[10] J.Dj. Golic,"On the security of shift register based keystream generators," Proc. Fast Software Encryption—Cambridge '93, Lecture Notes in Computer Science, vol. 809, R.J. Anderson, ed., pp. 90100. SpringerVerlag, 1994.
[11] D. Gollmann and W.G. Chambers,"Clockcontrolled Shift Registers: A Review," IEEE J. Select. Areas Communications, vol. 7, no. 4, pp. 525533, May 1989.
[12] D. Gollmann and W.G. Chambers,"A cryptanalysis of stepk,mcascades," Proc. Advances in Cryptology—EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, J.J. Quisquater and J. Vandewalle, eds., pp. 680687. SpringerVerlag, 1990.
[13] S.W. Golomb, Shift Register Sequences. Aegean Park Press, 1982.
[14] J. Massey,“Shiftregister synthesis and BCH decoding,” IEEE Trans. on Information Theory, vol. 15, pp. 122127, 1969.
[15] J.L. Massey and R.A. Rueppel,"Method of, and apparatus for, transforming a digital sequence into an encoded form," U.S. Patent no. 4,797,922, 1989.
[16] M. Matsui,“Linear cryptanalysis method for DES cipher,” Advances in Cryptology: Proc. EUROCRYPT’93, pp. 386397,Berlin, SpringerVerlag, 1994.
[17] W. Meier and O. Stafflebach, “Fast Correlation Attacks on Certain Stream Ciphers,” J. Cryptology, vol. 1, pp. 159176, 1989.
[18] R. Menicocci,"Short Gollmann cascade generators may be insecure," Proc. Codes and Cyphers, Cryptography and Coding IV, P.G. Farrell, ed., pp. 281297. Inst. of Mathematics and its Applications, 1995..
[19] M.J. Mihaljevic and J.Dj. Golic,"Convergence of a Bayesian iterative errorcorrection procedure on a noisy shift register sequence," Proc. Advances in Cryptology—EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. Rueppel, ed., pp. 124137. SpringerVerlag, 1993.
[20] M.J. Mihaljevic,"An approach to the initial state reconstruction of a clockcontrolled shift register based on a novel distance measure," Proc. Advances in Cryptology—AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, J. Seberry and Y. Zheng, eds., pp. 349356. SpringerVerlag, 1993.
[21] R.A. Rueppel,"Stream ciphers," Contemporary Cryptology: The Science of Information Integrity, G. Simmons, ed., pp. 65134.New York: IEEE Press, 1991.
[22] T. Siegenthaler,"Decrypting a class of stream ciphers using ciphertext only," IEEE Trans. Computers, vol. 34, pp. 8185, Jan. 1985.
[23] K.C. Zheng,C.H. Yang, and T.R.N. Rao,"On the linear consistency test (LCT) in cryptanalysis and its applications," Proc. Advances in Cryptology—CRYPTO '89, Lecture Notes in Computer Science, vol. 435, G. Brassard, ed., pp. 164174. SpringerVerlag, 1990.
[24] K.C. Zheng,C.H. Yang, and T.R.N. Rao,"An improved linear syndrome algorithm in cryptanalysis with applications," Proc. Advances in Cryptology—CRYPTO '90, Lecture Notes in Computer Science, vol. 537, A.J. Menezes and S.A. Vanstone, eds., pp. 3447. SpringerVerlag, 1991.
[25] M.V. Zivkovic,"An algorithm for the initial state reconstruction of the clockcontrolled shift register," IEEE Trans. Information Theory, vol. 37, pp. 1,4881,490, Sept. 1991.