The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (1996 vol.45)
pp: 482-486
ABSTRACT
<p><b>Abstract</b>—A concept of constrained many-to-one string edit distances, with or without memory, based on edit operations of deletion and substitution is introduced, and the recursive algorithms for their efficient computation are derived. Their use for correlation attacks on clock-controlled shift register based keystream generators is proposed, the divide and conquer effect is examined, and the generalized reducibility property of functions with memory is pointed out as a design criterion.</p>
INDEX TERMS
Clock-controlled shift registers, constrained edit distances, correlation attacks, keystream generators.
CITATION
Jovan Dj. Golic, "Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators", IEEE Transactions on Computers, vol.45, no. 4, pp. 482-486, April 1996, doi:10.1109/12.494106
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool