Advertisement

A modern rotor machine

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 809)

Keywords

Boolean Function Block Cipher Shift Register Stream Cipher Rotor Position 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [A]
    RJ Anderson, “Faster attack on certain stream ciphers”, in Electronics Letters 29 no 15 (22nd July 1993) pp 1322–1323Google Scholar
  2. [B1]
    L Brynielsson, “Information Leakage through a permutator”, at the 1993 Eurocrypt rump sessionGoogle Scholar
  3. [B2]
    Commodore AP Burgers, “State Policy and Legal Aspects on the Use of Communication Security in the Private Sector”, in Proc. Infosec 89 pp 1–15Google Scholar
  4. [D]
    W Diffie, comment from the floor of the workshopGoogle Scholar
  5. [DK]
    CA Deavours, L Kruh, ‘Machine Cryptography and Modern Cryptanalysis', Artech House, Dedham 1985Google Scholar
  6. [F]
    AJ Filipski, “How (un)secure is using a psuedo-random generator and XOR?”. Message 1993May11.202241.489@gtx.com in Usenet newsgroup sci.cryptGoogle Scholar
  7. [G1]
    D Gollmann, “Cryptanalysis of Clock Controlled Shift Registers” in these proceedings Google Scholar
  8. [G2]
    J Good, “Enigma and Fish”, in Codebreakers (ed FH Hinsley and A Stripp) OUP 93 pp 149–166Google Scholar
  9. [K1]
    D Kahn, ‘The Codebreakers', Macmillan, New York 1967Google Scholar
  10. [K2]
    AG Konheim, 'Cryptography — a Primer', Wiley 1981, pp 190 ffGoogle Scholar
  11. [K3]
    D Knuth, 'The Art of Computer Programming' v 3Google Scholar
  12. [RW]
    JA Reeds, PJ Weinberger, “File Security and the UNIX System Crypt Command”, in AT&T Bell Laboratories Technical Journal 63 no 8 (October 1984) pp 1673–1683Google Scholar
  13. [S]
    E Selmer, 'Linear Recurrence Relations Over Finite Fields', University of Bergen 1966Google Scholar
  14. [W]
    G Welchman, ‘The Hut Six Story — Breaking the Enigma Codes', McGraw-Hill, New York 1982Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  1. 1.Computer LaboratoryCambridge

Personalised recommendations