[1]

eSTREAM: the ECRYPT Stream Cipher Project, ECRYPT II, eSTREAM portfolio. [Online]. Available: http://www.ecrypt.eu.org/stream/

[2]

Robshaw M., Billiet O., New Stream Cipher Designs: The eSTREAM Finalists, Springer, 2008 Google Scholar

[3]

Menezes A. J., van Oorschot P. C., Vanstone S. A., Handbook of Applied Cryptography, Boca Raton, FL: CRC Press, 1996 Google Scholar

[4]

Paar C., Pelzl J., Understanding Cryptography, Berlin: Springer, 2010 Google Scholar

[5]

Rueppel R. A., Analysis and Design of Stream Ciphers New York, NY: Springer Verlag, 1986 Google Scholar

[6]

Golomb S. W., Shift Register-Sequences, Laguna Hill, California: Aegean Park Press, 1982 Google Scholar

[7]

Coppersmith D., Krawczyk H., Mansour Y., The shrinking generator, Advances in Cryptology – CRYPTO ’93, Lecture Notes in Computer Science, Springer-Verlag, 1993, 773, 23–39 Google Scholar

[8]

Meier W., Staffelbach O., The self-shrinking generator, Advances in Cryptology – EUROCRYPT ’94, Lecture Notes in Computer Science, Springer-Verlag, 1994, 950, 205–214 Google Scholar

[9]

Hu Y., Xiao G., Generalized Self-Shrinking Generator, IEEE Trans. Inf. Theory, 2004, 50(4), 714–719 CrossrefGoogle Scholar

[10]

Kanso A., Modified self-shrinking generator, Computers and Electrical Engineering, 2010, 36(5), 993–1001 CrossrefGoogle Scholar

[11]

Fúster-Sabater A., Caballero-Gil P., Linear solutions for cryptographic nonlinear sequence generators, Physics Letters A, 2007, 369, 432–437 Web of ScienceCrossrefGoogle Scholar

[12]

Cardell S. D., Fúster-Sabater A., Modelling the shrinking generator in terms of linear CA, Advances in Mathematics of Communication, 2016, 10(4), 797–809 CrossrefGoogle Scholar

[13]

Cardell S. D., Fúster-Sabater A., Linear models for the self-shrinking generator based on CA, Journal of Cellular Automata, 2016, 11(2-3), 195–211 Google Scholar

[14]

Duvall P. F., Mortick J. C., Decimation of periodic sequences, SIAM Journal on Applied Mathematics, 1971, 21(3), 367–372 CrossrefGoogle Scholar

[15]

Gong G., Theory and Applications of q-ary Interleaved Sequences, IEEE Trans. Inf. Theory, 1995, 41(2), 400–411 CrossrefGoogle Scholar

[16]

Zeng K., Yang C. H., Rao T. R., On the Linear Consistency Test (LCT) in Cryptanalysis with Applications, Advances in Cryptology – CRYPTO ’89, Lecture Notes in Computer Science, Springer-Verlag, 1990, 435, 164–174. CrossrefGoogle Scholar

[17]

Boztas S., Alamer A., Statistical dependencies in the Self-Shrinking Generator, Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, 2015, 42–46. Google Scholar

[18]

Gomulkiewicz M., Kutylowski M., Wlaź P., Fault cryptanalysis and the shrinking generator, 5th International Workshop on Experimetal Algorithms (WEA 2006), Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 4007, 61–72. Google Scholar

[19]

Golić J. D., Embedding and probabilistic correlation attacks on clock-controlled shift registers, Advances in Cryptology-EUROCRYPT’94, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1994, 950, 230–243. Google Scholar

[20]

Simpson L., Golić J. D., A probabilistic correlation attack on the shrinking generator, ACISP ’98 – Third Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1998, 1438, 147–158. CrossrefGoogle Scholar

[21]

Johansson T., Reduced complexity correlation attacks on two clock-controlled generators, Advances in Cryptology – ASIACRYPT’98, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1998, 1514, 342–357 Google Scholar

[22]

Golić J. D., Correlation analysis of the shrinking generator, Advances in Cryptology-Crypto’2001, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2001, 2139, 440–457 Google Scholar

[23]

Ekdahl P., Johansson T., Predicting the shrinking generator with fixed connections, Advances in Cryptology-EUROCRYPT’2003, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2003, 2656, 330–344 Google Scholar

[24]

Molland, H., Improved linear consistency attack on irregular clocked keystream generators, Fast Software Encryption-FSE’2004, Lecture Notes in Computer Science, Springer-Verlag, 2004, 3017, 109–126 CrossrefGoogle Scholar

[25]

Zhang B., Wu H., Feng D., Bao F., A fast correlation attack on the shrinking generator, Topics in Cryptology – CT-RSA 2005, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 537, 72–86 Google Scholar

[26]

Krawczyk H., The shrinking generator: Some practical considerations, Fast Software Encryption-FSE’94, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1994, 809, 45–46 Google Scholar

## Comments (0)

General note:By using the comment function on degruyter.com you agree to our Privacy Statement. A respectful treatment of one another is important to us. Therefore we would like to draw your attention to our House Rules.