Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
L.R. Simpson, E. Dawson, J. Golic, and W. Millan, “LILI keystream generator,” Proceedings of SAC 2000, Lecture Notes in Computer Science, vol. 2012, pp. 248-261, 2001
C.G. Gunther, “Alternating step generators controlled by De Bruijn sequences”, Proceedings of EUROCRYPT 1987, Lecture Notes in Computer Science, vol. 304, pp. 31-34, 1988
D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan, and B. Schneier, “Cryptanalysis of ORYX”, Proceedings SAC’98, Lecture Notes in Computer Science, vol. 1556, pp. 296-305, 1999
A. Biryukov, A. Shamir, and D. Wagner, “Real time cryptanalysis of A5/1 on a PC”, Proceedings of FSE 2000, Lecture Notes in Computer Science, vol. 1978, pp. 1-18, 2001
K. Kim, S. Lee, S. Park, and D. Lee, “Securing DES S-boxes against three robust cryptanalysis”, Proceedings of the Workshop on Selected Areas in Cryptography, pp. 145-157, 1995
A. Biryukov and A. Shamir, “Cryptanalytic time/memory/data trade-offs for stream ciphers”, Proceedings of ASIACRYPT 2000, Lecture Notes in Computer Science, vol. 1976, pp.1-13, 2000
W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers”, Journal of Cryptology, vol. 1, pp. 159-176, 1989
S. Jiang and G. Gong, “Cryptanalysis of stream cipher -A survey”, Technical Report CORR-2002-29, University of Waterloo, 2002
J. Golic and L. O’Connor, “Embedding and probabilistic correlation attacks on clockcontrolled shift registers”, Proceedings of EUROCRYPT 1994, Lecture Notes in Computer Science, vol. 950, pp. 230-243, 1995
J. Golic and M.J. Mihaljevic, “A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance”, Journal of Cryptology, vol. 3, pp. 201-212, 1991
J. Golic and S. Petrovic, “A generalized correlation attack with a probabilistic constrained edit distance”, Proceedings of EUROCRYPT 1992, Lecture Notes in Computer Science, vol. 658, pp. 472-476, 1993
FIPS PUB 140-2, Security requirements for cryptographic modules, http://csrc. nist.gov/cryptval/140-2.htm
Federal Information Processing Standards Publication FIPS PUB 140-2, Security requirements for cryptographic modules, NIST, http://csrc.nist.gov/cryptval/140-2.htm, 2001
A. Kholosha, “Clock-controlled shift registers and generalized Geffe key-stream generator”, Proceedings of INDOCRYPT 2001, Lecture Notes in Computer Science, vol. 2247, pp. 287-296, 2001
J. Golic and M. V. Zivkovic, “On the linear complexity of nonuniformly decimated PN-sequences”, IEEE Transactions on Information Theory, vol. 34, pp. 1077-1079, 1988
J.L. Massey, “Shift-register synthesis and BCH decoding”, IEEE Transactions on Information Theory, vol. 15, pp. 122-127, 1969
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ergüler, I., Anarim, E. (2006). A Clock-controlled Stream Cipher with Dual Mode. In: Göknar, İ.C., Sevgi, L. (eds) Complex Computing-Networks. Springer Proceedings in Physics, vol 104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-30636-6_38
Download citation
DOI: https://doi.org/10.1007/3-540-30636-6_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30635-1
Online ISBN: 978-3-540-30636-8
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)