Advertisement

Cryptanalysis of clock controlled shift registers

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 809)

Keywords

Edit Distance Output Sequence Linear Feedback Shift Register Automaton Theory Levenshtein Distance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    W.G.Chambers, D.Gollmann, Lock-in effect in cascades of clock-controlled shiftregisters, Proc. Eurocrypt'88, C.G.Günther (ed.), Springer LNCS 330, pp.331–342, 1988Google Scholar
  2. 2.
    D.Coppersmith, H.Krawczyk, Y.Mansour, The Shrinking Generator, to appear in Proc. Crypto'93, 1993Google Scholar
  3. 3.
    J.Dj.Golić, M.J.Mihaljević, A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance, Journal of Cryptology, Vol.3, No.3, pp.201–212, 1991Google Scholar
  4. 4.
    D.Gollmann, W.G.Chambers, Clock Controlled Shift Registers: A Review, IEEE JSAC, Vol.7, No.4, pp.525–533, 1989Google Scholar
  5. 5.
    D.Gollmann, W.G.Chambers, A Cryptanalysis of Step k,m-Cascades, Proc. Eurocrypt'89, J.-J.Quisquater, J.Vandewalle (eds.), Springer LNCS 434, pp.680–687, 1990Google Scholar
  6. 6.
    D.Gollmann, Automata Theory and Cryptography, Proc. Cryptography and Coding 1989, C.J.Mitchell (ed.), Oxford University Press, pp.67–74, 1992Google Scholar
  7. 7.
    Z.Kohavi, Switching and Finite Automata Theory, McGraw-Hill, New York, 1970Google Scholar
  8. 8.
    A.G.Konheim, Cryptography: A Primer, John Wiley & Sons, New York, 1981Google Scholar
  9. 9.
    R.Menicocci, Cryptanalysis of a two-stage Gollmann cascade generator, Proceedings of SPRC'93, W.Wolfowicz (ed.), pp.62–69, 1993Google Scholar
  10. 10.
    R.Menicocci, Short Gollmann Cascade Generators May Be Insecure, to appear in the Proceedings of the 4th IMA Conference on Cryptography and Coding, Cirencester, 1993Google Scholar
  11. 11.
    P.Wichmann, Cryptanalysis of a Modified Rotor Machine, Proc. Eurocrypt'89, J.-J.Quisquater, J.Vandewalle (eds.), Springer LNCS 434, pp.395–402, 1990Google Scholar
  12. 12.
    M.V.Zivković, An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register, IEEE Transactions on Information Theory, Vol.37, No.5, pp.1488–1490, 1991Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  1. 1.Department of Computer Science Royal HollowayUniversity of LondonUK

Personalised recommendations