1 |
J.Golic, M. Salmasizadeh, and E. Dawson, 'fast Correlation Attacks on the summation Generator,' Journal of cryptology, Vol.13, No.2, pp.245-262, 2000
DOI
|
2 |
T. Chang, B. Park, Y. H. Kim, 'An Efficient Inplementation of the D-Homomorphism for Generation of de Bruijn Sequences', IEEE Transactions on Information Theory, 45, 4, 1280-1283, 1999
DOI
ScienceOn
|
3 |
S. Babbage, 'Improved Exhaustive Search Attacks on Stream cipher', European Convention on Security and Detection, IEEE Conference Publication, Vol.408, pp.161-166, 1995
|
4 |
R.Rueppel, 'correlation Immunity and the Summation Generator,' Advances in Cryptology-CRYPTO '85, Lecture Notes in Computer Sciencen, Vol.218, pp.260-272, Springer-Verlag, 1985
|
5 |
T. Chang, I. Song, 'Cross-Joins in de Bruijn Sequences and Maximum Length Linear Sequences', IEICE Transactions Fundamentals, Vol.E76-A, No.9, pp.1494-1501, September, 1993
|
6 |
E.Dawson, 'Cryptanalysis of Summation generator,' Advances in Cryptology-ASIACRYPT 'Lecture Notes in Computer Science, Vol.718, pp.209-215, Springer-Verlag, 1993
DOI
ScienceOn
|
7 |
W. Meier and O. staffelbach, 'Correlation Properties of combiners with Memory in Stream Ciphers,' Advances in Cryptology-EUROCRYPT' 90, llLecture Notes in Computer Science, Vol.473, pp.204-213, Springer-Verlag, 1990
DOI
|
8 |
'Specification on the Bluetooth System', version 1.1 February, 22, 2001
|
9 |
Martin Hell, Thomas Johansson, Willi Meier, 'Grain: A stream Cipher for constrained Environments, International Journal of Wireless and Mobile Computing', Vol.2, No.1 pp.86-93, 2007
DOI
|
10 |
J. Massey, 'shift-Register Synthesis and BCH Decoding,' IEEE Transcations on Information Theroy, IT-15, No.1, pp.122-127, January, 1969
|