The Community for Technology Leaders
Green Image
ABSTRACT
<p>Progress in the design and analysis of pseudorandom bit generators over the last decade is surveyed. Background information is provided, and the linear feedback shift registers that serve as building blocks for constructing the generators are examined. Three methods for attacking keystream generators are reviewed, and three techniques for designing them are considered, focusing on how they fail or how their weakness is exposed under the attacks previously described. These techniques are nonlinear feedforward transformation, step control, and multiclocking.</p>
INDEX TERMS
CITATION

D. Wei, T. Rao, K. Zeng and C. Yang, "Pseudorandom Bit Generators in Stream-Cipher Cryptography," in Computer, vol. 24, no. , pp. 8-17, 1991.
doi:10.1109/2.67207
99 ms
(Ver 3.3 (11022016))