[1] |
COURTOIS N , MEIER W . Algebraic attacks on stream ciphers with linear feedback[A]. Cryptology-EUROCRYPT 2003[C]. Warsaw,Poland, 2003. 345-359.
|
[2] |
SIEGENTHALER T . Decrypting a class of stream ciphers using ciphertext only[J]. IEEE Transactions on Computers, 1985,C-34(1): 81-85.
|
[3] |
MEIER W , STAFFELBACH O . Fast correlation attacks on certain stream ciphers[J]. Journal of Cryptology, 1989,1(3): 159-176.
|
[4] |
KLIMOV A , SHAMIR A . A new class of invertible mappings[A]. Workshop on Cryptographic Hardware and Embedded Systems-CHES 2002[C]. Redwood Shores,CA,USA, 2003. 470-483.
|
[5] |
KLAPPER A , GORESKY M . 2-adic shift registers[A]. Fast Software Encryption-FSE 1993[C]. Cambridge,UK, 1993. 174-178.
|
[6] |
KLAPPER A , GORESKY M . Cryptanalysis based on 2-adic rational approximation[A]. Cryptology-CRYPTO 1995[C]. Santa Barbara,California,USA, 1995. 262-273.
|
[7] |
KLIMOV A , SHAMIR A . Cryptographic applications of T-functions[A]. Workshop on Selected Areas in Cryptography-SAC 2003[C]. Ottawa,Canada, 2004. 248-261.
|
[8] |
ZHANG W Y , WU C-K . The algebraic normal form,linear complexity and k-error linear complexity of single-cycle T-function[A]. Sequences and Their Applications-SETA 2006[C]. Beijing,China, 2006. 391-401.
|
[9] |
KLIMOV A , SHAMIR A . New cryptographic primitives based on multiword T-functions[A]. Fast Software Encryption-FSE 2004[C]. Delhi,India, 2004. 1-15.
|
[10] |
KLIMOV A , SHAMIR A . New applications of T-functions in block ciphers and hash functions[A]. Fast Software Encryption-FSE 2005[C]. Paris,France, 2005. 18-31.
|
[11] |
HU H G , FENG D G . On the 2-adic complexity and the k-error 2-adic complexity of periodic binary sequences[J]. IEEE Transactions on Information Theory, 2008,54(2): 874-883.
|