1 |
F. Armknecht, M. Krause, 'Algebraic Attacks on Combiners with Memory', Crypto 2003 , pp. 162-175, 2003
|
2 |
N. Courtois, 'Higher order correlation attacks, XL algorithm and Cryptanalysis of Toyocrypt', ICISC 2002, pp. 182--19, 2002
|
3 |
N. Courtois, W. Meier, 'Algebraic attacks on stream ciphers with linear feedback', Eurocrypt 2003, pp. 345-359, 2003
|
4 |
Donghoon Lee, Jaeheon Kim, Jin Hong, Jaewoo Han and Dukjae Moon, 'Algebraic Attacks on Summation Generators', FSE 2004, pp. 34-48, 2004
|
5 |
A. Braeken, I. Semaev, 'The ANF of the Composition + mod with a Boolean Functions', FSE 2005, pp. 115-127, 2005
|
6 |
R. A. Rueppel, 'Correlation immunity and the summation generator', Crypto 1985, pp. 260-272, 1985
|
7 |
E. Dawson, 'Cryptanalysis of summation generator', Auscrypt 1992, pp. 209--215, 1992
|
8 |
Willi Meier, Othmar Staffelbach, 'Correlation Properties of Combiners with Memory in Stream Cipher', Journal of Cryptology, vol.5, pp. 67-86, 1992
|
9 |
Hoon Jae Lee, Sang Jae Moon, 'On an improved summation generator with 2-bit memory', Signal Processing 80, pp. 211-217, Elsevier. 2000
DOI
ScienceOn
|
10 |
Daewan Han, Moonsik Lee, 'An algebraic attack on the improved summation generator with 2-bit memory', Information Proceeding Letters 2005, pp. 43-46, 2005
|
11 |
N. Courtois, 'Algebraic Attacks on Combiners with Memory and Several Outputs', ICISC 2004, pp. 3-20. 2004
|