Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Babbage S.H., “Improved “exhaustive search” attacks on stream ciphers”, European Convention on Security and Detection, 1995, 161–166
[2] Bluetooth SIG, Bluetooth Core Specification 4.2, 2014 https://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx?doc_id=286439
[3] Briceno M., Goldberg I., Wagner D., A pedagogical implementation of A5/1, 1999 http://www.scard.org/gsm/a51.html
[4] Eibach T., Pilz E., Völkel G., “Attacking Bivium using SAT solvers”, SAT 2008, Lect. Notes Comput. Sci., 4996, Springer, 2008, 63–76 | DOI | Zbl
[5] Golić J. Dj., “On the security of nonlinear filter generators”, FSE 1996, Lect. Notes Comput. Sci., 1039, 1996, 173–188 | DOI | Zbl
[6] Krause M., “BDD-based cryptanalysis of keystream generators”, EUROCRYPT 2002, Lect. Notes Comput. Sci., 2332, 2002, 222–237 | DOI | MR | Zbl
[7] Krause M., Stegemann D., “Reducing the space complexity of BDD-based attacks on keystream generators”, FSE 2006, Lect. Notes Comput. Sci., 4047, 2006, 163–178 | DOI | Zbl
[8] Meier W., Staffelbach O., “The self-shrinking generator”, EUROCRYPT '94, Lect. Notes Comput. Sci., 950, 1994, 205–214 | DOI | MR
[9] Meinel C., Theobald T., Algorithms and data structures in VLSI design, Springer-Verlag, Berlin–Heidelberg, 1998, xii+268 pp. | MR
[10] Somenzi F., CUDD, Website, , 2015 (accessed on February 05, 2018) http://vlsi.colorado.edu/f̃abio/
[11] Stegemann D., “Extended BDD-based cryptanalysis of keystream generators”, SAC 2007, Lect. Notes Comput. Sci., 4876, 2007, 17–35 | DOI | Zbl
[12] Wegener I., Branching Programs and Binary Decision Diagrams: Theory and Applications, SIAM e-books, Society for Industrial and Applied Mathematics, 2000 | MR | Zbl