We present some new ideas on attacking stream ciphers based on regularly clocked shift registers. The nonlinear filter functions used in such systems may leak information if they interact with shifted copies of themselves, and this gives us a systematic way to search for correlations between a keystream and the underlying shift register sequence.
CITATION STYLE
Anderson, R. (1995). Searching for the optimum correlation attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1008, pp. 137–143). Springer Verlag. https://doi.org/10.1007/3-540-60590-8_11
Mendeley helps you to discover research relevant for your work.