Information Technology Reference
In-Depth Information
References
1. Bluetooth,
Specifications
of
the
Bluetooth
system,Version
1.1,
http://www.bluetooth.com/
2. Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stin-
son, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22-39. Springer, Heidelberg
(1994)
3. Dickson, L.E.: Linear Groups with an Exposition of the Galois Field The-
ory, pp. 3-71. Dover, New York (1958); An updated reprint can be found at,
http://www-math.cudenver.edu/ ~ wcherowi/courses/finflds.html
4. eSTREAM,
the
ECRYPT
Stream
Cipher
Project,
Call
for
Primitives,
http://www.ecrypt.eu.org/stream/
5. Fuster-Sabater, A., Caballero-Gil, P.: Strategic Attack on the Shrinking Generator.
Theoretical Computer Science 409(3), 530-536 (2008)
6. Fuster-Sabater, A., Caballero-Gil, P., Delgado-Mohatar, O.: Deterministic Compu-
tation of Pseudorandomness in Sequences of Cryptographic Application. In: Allen,
G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.)
ICCS 2009. LNCS, vol. 5544, pp. 621-630. Springer, Heidelberg (2009)
7. Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)
8. Hu, Y., Xiao, G.: Generalized Self-Shrinking Generator. IEEE Trans. Inform. The-
ory 50, 714-719 (2004)
9. Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications.
Cambridge University Press, Cambridge (1986)
10. Meier, W., Staffelbach, O.: The Self-shrinking Generator. In: De Santis, A. (ed.)
EUROCRYPT 1994. LNCS, vol. 950, pp. 205-214. Springer, Heidelberg (1995)
11. Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York
(1997)
12. NIST Test suite for random numbers, http://csrc.nist.gov/rng/
13. Rivest, R.L.: The RC4 Encryption Algorithm. RSA Data Sec., Inc., March 98,
http://www.rsasecurity.com
14. Robshaw, M., Billet, O.: New Stream Cipher Designs. LNCS, vol. 4986. Springer,
Heidelberg (2008)
 
Search WWH ::




Custom Search