The Community for Technology Leaders
Green Image
<p>Progress in the design and analysis of pseudorandom bit generators over the last decade is surveyed. Background information is provided, and the linear feedback shift registers that serve as building blocks for constructing the generators are examined. Three methods for attacking keystream generators are reviewed, and three techniques for designing them are considered, focusing on how they fail or how their weakness is exposed under the attacks previously described. These techniques are nonlinear feedforward transformation, step control, and multiclocking.</p>
Dah-Yea Wei, T.R.N. Rao, Kencheng Zeng, Chung-Huang Yang, "Pseudorandom Bit Generators in Stream-Cipher Cryptography", Computer, vol. 24, no. , pp. 8-17, February 1991, doi:10.1109/2.67207
171 ms
(Ver 3.3 (11022016))