[1]
KLAPPER A, GORESKY M. 2-aidc shift registers [C] // Fast Software Encryption, LNCS 809. New York: Springer, 1993: 174-178.
[2]
GORESKY M, KLAPPER A. Arithmetic cross-correlations of feedback with carry shift register sequences [J]. IEEE Transactions on Information Theory, 1997, 43(4): 1342-1345.
[3]
GORESKY M, KLAPPER A. Fibonacci and Galois representations of feedback-with-carry shift registers [J]. IEEE Transactions on Information Theory, 2002, 48(11): 2826-2836.
[4]
薛帅,戚文峰. Galois FCSR的内部状态分析[J]. 计算机工程, 2008, 34(18):179-181.
[5]
FISCHER S, MEIER W, STEGEMANN D. Equivalent representations of the F-FCSR keystream generator [EB/OL]. [2012-03-01]. http://www.ecrypt.eu.org/stvl/sasc2008/.
[6]
ARNAULT F, BERGER T P. Design of a new class of stream ciphers [C] // Fast Software Encryption, LNCS 3557. New York: Springer, 2005: 83-97.
[7]
ARNAULT F, BERGER T P, LAURADOUX C. The FCSR: Primitive specification and supporting documentation [EB/OL]. [2012-01-01]. http://www.ecrypt.eu.org/stream/.
[8]
ARNAULT F, BERGER T P, LAURADOUX C. Update on F-FCSR stream cipher [EB/OL]. [2012-04-05]. http://www.ecrypt.eu.org/stream/.
[9]
ARNAULT F, BERGER T P, LAURADOUX C, et al.X-FCSR: A new software oriented stream cipher based upon FCSRs [C] // INDOCRYPT 2007, LNCS 4859. New York: Springer, 2007: 341-350.
[10]
HELL M, JOHANSSON T. Breaking the F-FCSR-H stream cipher in real time [C] // ASIACRYPT,LNCS 5350. New York: Springer, 2008: 557-569.
[11]
STANKOVSKI P, HELL M, JOHANSSON T. An efficient state recovery attack on X-FCSR-256 [C] // Fast Software Encryption,LNCS 5665. New York: Springer, 2009: 23-37.
[12]
ARNAULT F, BERGER T P, LAURADOUX C,et al.A new approach for FCSRs [C] // Selected Areas in Cryptography, LNCS 5867. New York: Springer, 2009: 433-448.
[13]
BERGER T P, MINIER M, POUSSE B. Software oriented stream ciphers based upon FCSRs in diversified mode [C] // INDOCRYPT 2009,LNCS 5922. New York: Springer, 2009: 119-135.
[14]
ARNAULT F, BERGER T P, POUSSE B. A matrix approach for FCSR automata [J]. Cryptography and Communications, 2010, 3(2): 109-139.
[15]
LAURADOUX C. Extended windmill polynomials [C] // ISIT’09: Proceedings of the 2009 IEEE International Conference on Symposium on Information Theory. New York: IEEE Press, 2009: 1120-1124. |