REFERENCES

R. ANDERSON, “Searching for the Optimum Correlation Attack,” in Fast Software Encryption, 2nd International Workshop, December 14–16, 1994, Springer-Verlag, 1995, 137–143.

E. BARKAN, E. BIHAM, and N. KELLER, “Instant Ciphertext-Only Cryptanalysis is GSM Encrypted Communication,” Proceedings of Crypto 2003, pp. 600–616.

H. BEKER and F. PIPER, Cipher Systems: The Protection of Communications, John Wiley & Sons, New York, NY, 1982.

A. BIRYUKOV, A. SHAMIR, and D. SHAMIR, “Weaknesses in the Key Scheduling Algorithm of RC4,” Selected Areas in Cryptography, 2001, pp. 1–24.

S. R. FLUHRER and D. A. MCGREW, “Statistical Analysis of the Alleged RC4 Keystream Generator,” in Fast Software Encryption, 2000, p. 1930.

J. GOLIĆ, “Cryptanalysis of the Alleged A5 Stream Cipher,” In Advances in Cryptology, EUROCRYPT ’97, Springer-Verlag, New York, NY, pp. 239–255.

S. W. GOLOMB, Shift Register Sequences, Aegean Park Press, Lagune Beach, CA, 1982.

G. GÜNTHER, “Alternating Step Generators Controlled by de Bruijn Sequences,” in Advances in Cryptography-EUROCRYPT ’87, Springer-Verlag, New York, NY, 1988, 99. 5–14.

E. KEY, “An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators,” IEEE Transactions on Information Theory, 22, 732–736 (1976).

R. LIDL and H. NIEDERRIETER, Finite Fields, Cambridge University Press, Cambridge, United Kingdom, 1997.

J. J. MASSEY, “Shift-Register Synthesis of BCH Decoding,” IEEE Transactions on Information Theory, IT-15, 1122–1127 (1969). ...

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.