An algebraic attack on the improved summation generator with 2-bit memory.

Daewan HanMoonsik Lee
Published in: Inf. Process. Lett. (2005)
Keyphrases
  • countermeasures
  • computing power
  • random access memory
  • information security
  • memory requirements
  • memory usage
  • data mining
  • high speed
  • computational power
  • limited memory