The Community for Technology Leaders
Green Image
<p>Progress in the design and analysis of pseudorandom bit generators over the last decade is surveyed. Background information is provided, and the linear feedback shift registers that serve as building blocks for constructing the generators are examined. Three methods for attacking keystream generators are reviewed, and three techniques for designing them are considered, focusing on how they fail or how their weakness is exposed under the attacks previously described. These techniques are nonlinear feedforward transformation, step control, and multiclocking.</p>

D. Wei, T. Rao, K. Zeng and C. Yang, "Pseudorandom Bit Generators in Stream-Cipher Cryptography," in Computer, vol. 24, no. , pp. 8-17, 1991.
99 ms
(Ver 3.3 (11022016))