Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
From MaRDI portal
Publication:451122
DOI10.1007/S00145-009-9053-2zbMath1258.94037OpenAlexW2033939340WikidataQ122052054 ScholiaQ122052054MaRDI QIDQ451122
Publication date: 21 September 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-009-9053-2
Related Items (3)
An efficient state recovery attack on the X-FCSR family of stream ciphers ⋮ A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences ⋮ Fast construction of binary ring FCSRs for hardware stream ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast correlation attacks on certain stream ciphers
- Feedback shift registers, 2-adic span, and combiners with memory
- Register synthesis for algebraic feedback shift registers based on non-primes
- An Efficient State Recovery Attack on X-FCSR-256
- Feedback With Carry Shift Registers Synthesis With the Euclidean Algorithm
- Breaking the F-FCSR-H Stream Cipher in Real Time
- Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators
- 2-Adic shift registers
- A Survey of Feedback with Carry Shift Registers
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs
- Fast Software Encryption
- Progress in Cryptology - INDOCRYPT 2004
This page was built for publication: Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time