1 |
Hoonjae Lee, Sangjae Moon, "On an Improved Summation Generator with 2-Bit Memory," Signal Processing, Vol. 80, no. 1. pp. 211-217, Jan. 2000.
DOI
|
2 |
A. Menezes, HandBook of Applied Cryptography, CRC Press, 2001.
|
3 |
J. Massey. "Shift-Register Synthesis and BCH Decoding," IEEE Transactions on Information Theory, IT-15, no. 1, pp. 122-127, Jan. 1969.
DOI
|
4 |
C. Paar, J. Pelzl, “Stream Ciphers”, Chapter 2 of Understanding Cryptography, A Textbook for Students and Practitioners.(companion web site contains online cryptography course that covers stream ciphers and LFSR), Springer, 2009.
|
5 |
P. Kitsos, N. Sklavos, K. Papadomanolakis and O. Koufopavlou, “Hardware Implementation of Bluetooth Security”, IEEE Pervasive Computing, vol. 2, no. 1, pp. 21-29, Jan.-Mar. 2003.
DOI
|
6 |
V. S. Pendluri, P. Gupta, R. Majumdar, "Design and Implementation of Keystream Generator with Improved Security," in ICACT2011, Gangwon-Do, pp. 1626-1631, 2011.
|
7 |
P. Chandra, Bulletproof Wireless Security - GSM, UTMS, 802.11 and Ad Hoc Security, Elsevier, 2005.
|
8 |
J. Kim, S. Cho, T. Kim and Hoonjae Lee, "A proposal of the Self_Decimated LM-128 Keystream Generator," in Proceeding of the 21th KIPS Spring Conference, Seoul, pp. 1011-1014, 2004.
|
9 |
R. Rueppel, "Correlation Immunity and the Summation Generator," Advance in Cryptology -CRYPTO '85, Lecture Notes in Computer Science, Vol. s18, pp. 260-272, Springer-Verlag, 1985.
|
10 |
W. Meier and O. Staffelbach. "Correlation Properties of combiners with Memory in Stream Ciphers," Advance in Cryptology -EUROCRYPT '90, Lecture Notes in Computer Science, Vol. 473, pp. 204-312, Springer-Varlag, 1990.
|