A simple attack on some clock-controlled generators
From MaRDI portal
Publication:980102
DOI10.1016/J.CAMWA.2009.03.103zbMath1189.94043OpenAlexW2039322835WikidataQ61763338 ScholiaQ61763338MaRDI QIDQ980102
Pino Caballero-Gil, Amparo Fúster-Sabater
Publication date: 28 June 2010
Published in: Computers \& Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2009.03.103
Applications of graph theory (05C90) Cryptography (94A60) Graph algorithms (graph-theoretic aspects) (05C85)
Cites Work
- Correlation analysis of the alternating step generator
- Shrinking generators and statistical leakage
- How hard is computing the edit distance?
- A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
- Distinguishing Stream Ciphers with Convolutional Filters
- Embedding Probabilities for the Alternating Step Generator
- Algorithms on Strings, Trees and Sequences
- Computer Aided Systems Theory – EUROCAST 2005
- Information and Communications Security
- Topics in Cryptology – CT-RSA 2005
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A simple attack on some clock-controlled generators