[1] 王中孝,戚文峰.非线性反馈移位寄存器串联分解唯一性探讨[J].电子与信息学报,2014,36(7):1656-1660. Wang Zhong-xiao,Qi Wen-feng.On the uniqueness of decomposition of a NFSR into a cascade connection of smaller NFSRs[J].Journal of Electronics & Information Technology,2014,36(7):1656-1660.(in Chinese)
[2] Meier W,Staffelbach O.Fast correlation attacks on certain stream ciphers[J].Journal of Cryptology,1989,1(3):159-176.
[3] Courtois N T.Higher order correlation attacks,XL algorithm and cryptanalysis of toyocrypt[A].Proceedings of Information Security and Cryptology-ICISC 2002,Lecture Notes in Computer Science 2587[C].Berlin:Springer-Verlag,2003.182-199.
[4] Courtois N T,Meier W.Algebraic attacks on stream ciphers with linear feedback[A].Advances in Cryptology EUROCRYPT 2003[C].Warsaw,Poland,2003.346-359.
[5] Meier W,Pasalic E,Carlet C.Algebraic attacks and decomposition of boolean functions[A].Proceedings of Advances in Cryptology EUROCRYPT 2004,Lecture Notes in Computer Science 3027[C].Berlin:Springer-Verlag,2004.474-491.
[6] Turan M S.On the nonlinearity of maximum-length NFSR feedbacks[J].Cryptography and Communications,2012,4(3/4):233-243.
[7] Zhong J,Lin D.Driven stability of nonlinear feedback shift registers with inputs[J].IEEE Transactions on Communications,2016,64(6):2274-2284.
[8] Martin H,Thomas J,Willi M.New Stream Cipher Designs:The eSTREAM Finalists[M].Berlin:Springer,2008.179-190.
[9] 朱士信,孙琳.K元de Bruijn序列的反馈函数的一个升级算法[J].电子学报,2006,34(6):1066-1068. ZHU Shi-xin,SUN Lin.An algorithm for generating feedback functions of k-ary de Bruijn sequences by raising stage[J].Acta Electronica Sinica,2006,34(6):1066-1068.(in Chinese)
[10] Lempel A.On a homomorphism of the de Brujin graph and its application to design of feedback shift registers[J].IEEE Transactions on Computers,1970,19(12):1204-1209.
[11] Mandal K,Gong G.Crytographically strong de Bruijn sequences with large periods[A].Proceedings of Selected Area in Crytography,Lecture Notes in Computer Science 7707[C].Berlin:Springer-Verlag,2013.104-118.
[12] Abbas A,Mufutau A.A recursive construction of nonbinary de Bruijn sequences[J].Designs Codes and Cryptography,2011,60(2):155-169.
[13] Mitchell C J,Etzion T,Paterson K G.A method for constructing decodable de Brujin sequences[J].IEEE Transactions on Information Theory,1996,42(5):1472-1478.
[14] 丁存生,肖国镇.流密码学及其应用[M].北京:国防工业出版社,1994.
[15] Golomb S W.Shift Register Sequences[M].San Francisco:Aegean Park Press,1967.
[16] Dubrova E.Generation of full cycles by a composition of NLFSRs[J].Designs,Codes and Cryptography,2014,73(2):469-486.
[17] Gong G.Theory and applications of q-ary interleaved sequences[J].IEEE Transactions on Information Theory,1995,41(2):400-411.
[18] Li N,Tang X,Helleseth T.New M-ary sequences with low autocorrelation from interleaved technique[J].Designs Codes and Cryptography,2014,73(1):237-249. |