R. J. Anderson. Solving a class of stream ciphers
, Cryptologia 14, no. 3, 1990, pp. 285–288.Google Scholar
R. J. Anderson. Fast Attack on Certain Stream Ciphers
, Electronics Letters, 22nd July 1993, Vol. 29, No. 15, pp. 1322–1323.Google Scholar
R. J. Anderson. Derived sequence attacks on stream ciphers, presented at the Rump Session of Crypto'93.
L. D. Baumert. Cyclic Difference Sets, Lecture Notes on Mathematics, Vol. 182, Springer-Verlag, 1971.
H. Beker, F. Piper. Cipher Systems: The Protection of Communications
, Northwood Books, London, 1982.Google Scholar
D. Coppersmith, H. Krawczyk, Y. Mansour. The Shrinking Generator, Preproceedings of Crypto'93.
E. Biham, A. Shamir. Differential cryptanalysis of DES-like crypto systems, Advances in Cryptology, Proc. of Crypto '90, LNCS, Springer-Verlag, 1990.
E. Biham. On the applicability of differential cryptanalysis to hash functions, E.I.S.S. Workshop on Cryptographic Hash Functions, Oberwolfach (D), March 25–27, 1992.
L. Blum, M. Blum, M. Shub. A simple unpredictable pseudorandom number operator, SIAM J. Comput. 15, pp. 364–383.
J. O. Brüer. On pseudorandom sequences as crypto generators, Proc. of Int. Zürich Sem. on Digital Communic, Zürich, Swithland, 1984.
W. Diffie, M. Hellman. Privacy and authentication: An introduction to cryptography
, Proc. IEEE, vol. 67(3), Mar. 1979, pp. 397–427.Google Scholar
C. Ding, G. Xiao, W. Shan. The Stability Theory of Stream Ciphers. LNCS, vol. 561, Springer-Verlag, 1991.
P. R. Geffe. How to protect data with ciphers that are really hard to break, Electronics, Jan. 4, 1973.
J. Golič, M. Mihaljevič. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
, J. Cryptology, Vol. 3(3), pp. 201–212, 1991.Google Scholar
D. Gollmann, W. G. Chambers. A Cryptanalysis of Step
k,m-Cascadeds, Proc. Eurocrypt'89, J. Quisquater, J. Vandewalle (eds.), Springer-Verlag, LNCS 434, pp. 680–687, 1990.
D. Gollmann, W. G. Chambers, clock-controlled shift registers: A review
, IEEE J. on Selected Areas in Communications, vol. 7, no. 4, May 1989, pp. 525–533.Google Scholar
S. M. Jennings. Multiplexed sequences: Some properties of the minimal polynomial, LNCS, vol. 149, Springer-Verlag; 1983, pp. 189–206.
E. L. Key. An analysis of the structure and complexity of nonlinear binary sequences generators
, IEEE Trans. Inform. Theory, vol. IT-22, no. 6, Nov. 1976, pp. 732–763.Google Scholar
A. Klapper, M. Goresky. 2-adic shift registers, Proc. of the 1993 Cambridge Algorithm Workshop, December 9–11 1993 (this volume)
J. L. Massey, I. Ingemarsson. The Rip van Winkel Cipher: A simple and provably computationally secure cipher with a finite key, in IEEE Int. Symp. on Inform. Theory, (Brighton, England), Abstr. June 24–28, 1985, pp. 146.
U. Maurer. A provably-secure strongly randomized cipher, in Advances in Cryptology, Eurocrypt'90, I. Damgård, Ed., LNCS, vol. 473, Springer-Verlag, 1991, pp. 361–373.
W. Meier, O. Staffelbach. Fast correlation attacks on certain stream ciphers
, J. Cryptology, Vol. 1(3), pp. 159–176, 1989.Google Scholar
R. Mennicocci. Cryptanalysis of a two-stage Gollmann cascade generator, Proc. of SPRC'93, W. Wolfowicz (ed.), pp. 62–69, 1993.
K. Nyberg, L. R. Knudsen. Provable security against differential cryptanalysis, Advances in Cryptology: Eurocrypt'92.
V. S. Pless. Encryption schemes for computer confidentiallity
, IEEE Trans. Cornput., vol. C-26, Nov. 1977, pp. 756–763.Google Scholar
B. Preneel, R. Govaerts, J. Vandewalle. Differential Cryptanalysis of Hash Functions Based on Block Ciphers
, Proc. of the 1st ACM Conference on Computer & Communications Security, Fairfax VA, Nov 1993, published by the ACM pp. 183–188.Google Scholar
R. A. Rueppel. Design and Analysis of Stream Ciphers. Springer-Verlag, 1986.
A. Shamir. On the generation of cryptographically strong pseudo-random sequences, 8th Int. Colloquium on Automata, Languages and Programming, LNCS vol. 62, Springer-Verlag, 1981.
T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext only
, IEEE Trans. Computers, Vol. C-34, No. 1, Jan. 1985, pp. 81–85.Google Scholar
T. Storer. Cyclotomy and Difference Sets
, Markham Publishing Company, Chicago, 1967.Google Scholar
K. C. Zeng, C. H. Yang, T. R. N. Rao. On the linear consistancy test (LCT) in cryptanalysis and its applications, Advances in Cryptology, Crypto'89, Springer-Verlag, LNCS 435, pp. 164–174.