Login / Signup
Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators.
Jovan Dj. Golic
Slobodan V. Petrovic
Published in:
IEEE Trans. Computers (1996)
Keyphrases
</>
cellular automata
stream cipher
power consumption
countermeasures
correlation coefficient
pseudorandom
malicious attacks
high speed
attack detection
security threats
random numbers
traffic analysis
malicious users
real time
terrorist attacks
high correlation
correlation analysis
power law