Bouquet 发表于 2025-4-1 04:20:44

http://reply.papertrans.cn/47/4655/465425/465425_61.png

忍受 发表于 2025-4-1 09:41:16

http://reply.papertrans.cn/47/4655/465425/465425_62.png

割让 发表于 2025-4-1 10:42:17

A stream cipher based on linear feedback over GF(28),t. This paper introduces a mechanism for creating a family of stream ciphers based on Linear Feedback Shift Registers over the Galois Finite Field of order 2., where . is chosen to be convenient for software implementation. A particular stream cipher based on this methodology, SOBER, is presented and analysed.

obstruct 发表于 2025-4-1 16:01:52

A probabilistic correlation attack on the shrinking generator, linear in the length of the clock-controlled shift register, the shift register initial states can be identified with high probability. The attack is conducted under the assumption that the secret key controls only the shift register initial states.

receptors 发表于 2025-4-1 18:51:18

http://reply.papertrans.cn/47/4655/465425/465425_65.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Information Security and Privacy; Third Australasian C Colin Boyd,Ed Dawson Conference proceedings 1998 Springer-Verlag Berlin Heidelberg 1