Part of the Lecture Notes in Computer Science book series (LNCS, volume 950)
A systematic attack on clock controlled cascades
Cascades of clock controlled shift registers play an important role in the design of pseudorandom generators for stream cipher cryptography. In this paper, an attack for breaking a kind of such cascades is presented.
- R.A. RUEPPEL. “Stream Ciphers” in Contemporary Cryptology (G.J. Simmons, ed.). New York: IEEE Press, 1992.Google Scholar
- R. MENICOCCI. “Cryptanalysis of a Two-Stage Gollmann Cascade Generator” Proc. SPRC '93 (W. Wolfowicz, ed.), pp. 62–69. Rome (Italy), February 1993.Google Scholar
- R. MENICOCCI. “Short Gollmann Cascade Generators May Be Insecure”. Proc. Fourth IMA Conf. on Cryptography and Coding, Cirencester (UK), Dicember 1993 (to appear).Google Scholar
- M. MARTURANO. “L'Algoritmo della Sindrome Lineare negli Attacchi Crittanalitici a Correlazione” (in Italian) Laurea Thesis, University “La Sapienza”, Infocom Dept., Rome, 1992.Google Scholar
© Springer-Verlag Berlin Heidelberg 1995