7 found
Order:
Disambiguations
Amparo Fúster-Sabater [4]A. Fuster-Sabater [3]
  1.  13
    Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs.Sara D. Cardell, Diego F. Aranha & Amparo Fúster-Sabater - 2022 - Logic Journal of the IGPL 30 (3):561-561.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  5
    Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs.Sara D. Cardell, Diego F. Aranha & Amparo Fúster-Sabater - 2020 - Logic Journal of the IGPL 28 (4):430-448.
    The sequences produced by the cryptographic sequence generator known as the shrinking generator can be modelled as the output sequences of linear elementary cellular automata. These sequences are composed of interleaved m-sequences produced by linear structures based on feedback shifts. This profitable characteristic can be used in the cryptanalysis of this generator. In this work we propose an algorithm that takes advantage of the inherent linearity of these CA and the interleaved m-sequences. Although irregularly decimated generators have been conceived and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  17
    Binomial Representation of Cryptographic Binary Sequences and Its Relation to Cellular Automata.Sara D. Cardell & Amparo Fúster-Sabater - 2019 - Complexity 2019:1-13.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  20
    Software implementation of the SNOW 3G Generator on iOS and Android platforms.J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil & A. Fúster-Sabater - 2016 - Logic Journal of the IGPL 24 (1).
  5.  3
    Randomness study of the concatenation of generalized sequences.Sara D. Cardell, Amalia B. Orúe, Verónica Requena & Amparo Fúster-Sabater - 2022 - Logic Journal of the IGPL 30 (6):993-1004.
    Keystream sequences should look as random as possible, i.e. should present no logical pattern to be exploited in cryptographic attacks. The generalized self-shrinking generator, a sequence generator based on irregular decimation, produces a family of sequences with good cryptographic properties. In this work, we display a detailed analysis on the randomness of the sequences resulting from the concatenation of elements of this family. We apply the most important batteries of statistical and graphical tests providing powerful results and a new method (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  14
    Software implementation of cryptographic sequence generators over extended fields.O. Delgado-Mohatar & A. Fuster-Sabater - 2015 - Logic Journal of the IGPL 23 (1):73-87.
  7.  6
    Optimal modes of operation of pseudorandom sequence generators based on DLFSRs.A. Peinado, J. Munilla & A. Fúster-Sabater - 2016 - Logic Journal of the IGPL 24 (6):933-943.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark