[1] Dj Golic,J Menicocci,R.Edit probability correlation attacks on stop/go clocked keystream generators[J].J Cryptology,2003,16(1):41-68.
[2] Zhang B,Wu H,Feng D,Bao F.A fast correlation attack on the shrinking generator[A].Topics in Cryptology-CT-RSA 2005.CT-RSA 2005[C].Springer,Berlin,Heidelberg.2005.LNCS 3376:72-86.
[3] Martin Hell,Thomas Johansson.Two new attacks on the self-shrinking generator[J].IEEE Transactions on Information Theory,2006,52(8):3837-3843.
[4] Faheem Masoodi,Shadab Alam and M U Bokhari.An analysis of linear feedback shift registers in stream ciphers[J].International Journal of Computer Applications,2012,46(17):46-49.
[5] Zhong X,Wang M,Zhang B,Wu S.A guess-then-algebraic attack on LFSR-based stream ciphers with nonlinear filter[A].Information and Communications Security.ICICS 2014[C].Springer,Cham.2015.LNCS 8958:132-142.
[6] Goli'c,J,Menicocci,R.A new statistical distinguisher for the shrinking generator[OL].http://eprint.iacr.org/2003/041.
[7] Debraize B,Goubin L.Guess-and-determine algebraic attack on the self-shrinking generator[A].Fast Software Encryption.FSE 2008[C].Springer,Berlin,Heidelberg,2008.LNCS 5086:235-252.
[8] 冯登国.NESSIE工程简介[J].信息安全与通信保密,2001,(3):36-39.
[9] Robshaw M.The eSTREAM project[A].New Stream Cipher Designs[C].Springer,Berlin,Heidelberg,2008.LNCS 4986:1-6.
[10] Elena Dubrova.An equivalence preserving transformation from the Fibonacci to the Galois NLFSRs[OL].2008,http://arxiv.org/PS_cache/arxiv/pdf/0801/0801.4079v2.pdf.
[11] Deb S.,Biswas B.,Kar N.(2015) Study of NLFSR and reasonable security improvement on trivium cipher[A].Information Systems Design and Intelligent Applications.Advances in Intelligent Systems and Computing[C].Springer,New Delhi,2015.339:731-739.
[12] Shi T,Anashin V,Lin D.Linear weaknesses in t-functions[A].Sequences and Their Applications-SETA 2012.SETA 2012[C].Springer,Berlin,Heidelberg,2012.LNCS 7280:279-290.
[13] Vladimir Anashin,Andrei Khrennikov,Ekaterina Yurova.T-functions revisited:new criteria for bijectivity/transitivity[J].Des.Codes Cryptogr,2014,71(3):383-407.
[14] Francois Arnault,Thierry P.Berger and Benjamin Pousse.A matrix approach for FCSR automata.Cryptography and Communications,2011[OL].www.springerlink.com/index/J16174424270X56G.pdf.
[15] Paul Stankovski,Martin Hell,Thomas Johansson.An efficient state secovery attack on the X-FCSR family of stream ciphers[J].J Cryptol,2014,27(1):1-22.
[16] Klapper A,Goresky M.2-Adic shift registers[A].Fast Software Encryption.FSE 1993[C].Springer,Berlin,Heidelberg.1994.LNCS 809:174-178.
[17] Arnault F,Berger T P.(2005) F-FCSR:Design of a new class of stream ciphers[A].Fast Software Encryption.FSE 2005[C].Springer,Berlin,Heidelberg.2005.LNCS 3557:83-97.
[18] Hell M,Johansson T.(2008) Breaking the F-FCSR-H stream cipher in real time[A].Advances in Cryptology-ASIACRYPT 2008.ASIACRYPT 2008[C].Springer,Berlin,Heidelberg.2008.LNCS 5350:557-569.
[19] Song H,Fan X,Wu C,Feng D.On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3[A].Information Security and Cryptology.Inscrypt 2011[C].Springer,Berlin,Heidelberg,2012.LNCS 7537:160-178.
[20] Arnault F,Berger T,Lauradoux C,Minier M,Pousse B.A new approach for FCSRs[A].Selected Areas in Cryptography.SAC 2009[C].Springer,Berlin,Heidelberg,2009.LNCS 5867:433-448.
[21] Marjane A,Allailou B.Vectorial conception of FCSR[A].Sequences and Their Applications-SETA 2010.SETA 2010[C].Springer,Berlin,Heidelberg,2010.LNCS 6338:240-252.
[22] Allailou B,Marjane A,Mokrane A.Design of a novel pseudo-random generator based on vectorial FCSRs[A].Information Security Applications.WISA 2010[C].Springer,Berlin,Heidelberg,2011.LNCS 6513:76-91.
[23] Berger T P,Minier M,Pousse B.Software oriented stream ciphers based upon FCSRs in diversified mode[A].Progress in Cryptology-INDOCRYPT 2009.INDOCRYPT 2009[C].Springer,Berlin,Heidelberg,2009.5922:119-135.
[24] Stankovski P,Hell M,Johansson T.An efficient state recovery attack on the X-FCSR family of stream ciphers[J].Journal of Cryptology,2014,27(1):1-22.
[25] Wang H,Stankovski P,Johansson T.A generalized birthday approach for efficiently finding linear relations inl-sequences[J].Designs Codes & Cryptography,2015,74(1):41-57.
[26] Pei D,Lin Z,Zhang X.Construction of transition matrices for ternary ring feedback with carry shift registers[J].IEEE Transactions on Information Theory,2015,61(5):2942-2951.
[27] 刘鑫,田甜,戚文峰.一类LFSR序列簇的2-adic复杂度[J].系统科学与数学,2015,35(9):999-1007. Liu xin,Tian tian,Qi wenfeng.The 2-adic complexity of a class of LFSR sequence families[J].Journal of Systems Scieme and Mathematical Sciences,2015,35(9):999-1007.(in Chinese)
[28] Lin Z,Lin D,Pei D.Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications[J].Cryptography & Communications,2017,9(4):431-443.
[29] M.Goresky,A Klapper.Fibonacci and galois representations of feedback-with-carry shift registers[J].IEEE Transaction on Information Theory,2002,48(11):2826-2836. |