A modern rotor machine

  • Ross Anderson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 809)

References

  1. [A]
    RJ Anderson, “Faster attack on certain stream ciphers”, in Electronics Letters 29 no 15 (22nd July 1993) pp 1322–1323Google Scholar
  2. [B1]
    L Brynielsson, “Information Leakage through a permutator”, at the 1993 Eurocrypt rump sessionGoogle Scholar
  3. [B2]
    Commodore AP Burgers, “State Policy and Legal Aspects on the Use of Communication Security in the Private Sector”, in Proc. Infosec 89 pp 1–15Google Scholar
  4. [D]
    W Diffie, comment from the floor of the workshopGoogle Scholar
  5. [DK]
    CA Deavours, L Kruh, ‘Machine Cryptography and Modern Cryptanalysis', Artech House, Dedham 1985Google Scholar
  6. [F]
    AJ Filipski, “How (un)secure is using a psuedo-random generator and XOR?”. Message 1993May11.202241.489@gtx.com in Usenet newsgroup sci.cryptGoogle Scholar
  7. [G1]
    D Gollmann, “Cryptanalysis of Clock Controlled Shift Registers” in these proceedings Google Scholar
  8. [G2]
    J Good, “Enigma and Fish”, in Codebreakers (ed FH Hinsley and A Stripp) OUP 93 pp 149–166Google Scholar
  9. [K1]
    D Kahn, ‘The Codebreakers', Macmillan, New York 1967Google Scholar
  10. [K2]
    AG Konheim, 'Cryptography — a Primer', Wiley 1981, pp 190 ffGoogle Scholar
  11. [K3]
    D Knuth, 'The Art of Computer Programming' v 3Google Scholar
  12. [RW]
    JA Reeds, PJ Weinberger, “File Security and the UNIX System Crypt Command”, in AT&T Bell Laboratories Technical Journal 63 no 8 (October 1984) pp 1673–1683Google Scholar
  13. [S]
    E Selmer, 'Linear Recurrence Relations Over Finite Fields', University of Bergen 1966Google Scholar
  14. [W]
    G Welchman, ‘The Hut Six Story — Breaking the Enigma Codes', McGraw-Hill, New York 1982Google Scholar

Copyright information

© Springer-Verlag 1994

Authors and Affiliations

  • Ross Anderson
    • 1
  1. 1.Computer LaboratoryCambridge

Personalised recommendations