1 |
Hua Loo Keng, Introduction to Number Theory, Springer-Verlag, 1982
|
2 |
J. M. Massey, 'Shift-Register Synthesis and BCH Decoding,' IEEE Trans. Info. Theory, VoI.IT-15, pp.122-127, 1969
DOI
|
3 |
서창호, 이상진, 김용대, 임종인, 'FCSR의 선형복잡도 하한에 관하여', 통신정보보호학회 논문지, Vol.7, No.4, pp. 127-132, 1997
과학기술학회마을
|
4 |
Changho Seo, Sangjin Lee, Yeoulouk Sung, Keunhee Han, Sangchoon Kim, 'A lower bound on the linear span of an FCSR,' IEEE Trans. on Information Theory, Vol.46, No.2, pp.691-693, 2001
DOI
ScienceOn
|
5 |
Changho Seo, Sangjin Lee, Yeoulouk Sung, Keunhee Han, Sangchoon Kim, 'A lower bound on the linear span of an FCSR,' IEEE Trans. on Information Theory, Vol.46, No.2, pp.691-693, 2001
DOI
ScienceOn
|
6 |
D.E.Kunth, The art of computer Programming, Vol.2: Seminumberical Algorithms, Addison-Wesley, 1981
|
7 |
M.Goresky and A.Klapper, 'Feedback Registers based on Ramified Extensions of the 2- Adic Numbers,' Advances in Cryptology-CRYPTO'94, LNCS 950, pp.215-222, 1994
DOI
|
8 |
Meier and O.Staffelbach, 'Correlation Properties of combiners with memory in stream ciphers,' Journal of Cryptology, Vol.5, No.1, pp.67-86, 1992
DOI
|
9 |
R.A. Rueppel, 'Analysis and Design of Stream Ciphers,' Springer-Verlag, Berlin, Heidelberg, New York, London, Paris, Tokyo, In Communications and Control Engineering Series, 1986
|
10 |
W.Meier and O.Staffelbach, 'Fast Correlation Attacks on Certain Stream Ciphers,' Journal of Cryptology, Vol.1, No.3, pp.159-176, 1989
DOI
|