Embedding attacks on step[1..D] clock-controlled generators
2000
In a step [1..D] cryptographic generator a selector determines which bits from a primitive shift-register's output are sent to the final output, the maximum spacing being D. Two attacks are described, one through finding where embeddings are possible, valid for D=2 and 3, and the other through counting embeddings.
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
4
References
3
Citations
NaN
KQI