Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2022_4_a5, author = {L. A. Kuschinskaya}, title = {The method for constructing uniform planar approximations of the filter generator}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {57--68}, publisher = {mathdoc}, number = {4}, year = {2022}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2022_4_a5/} }
L. A. Kuschinskaya. The method for constructing uniform planar approximations of the filter generator. Prikladnaâ diskretnaâ matematika, no. 4 (2022), pp. 57-68. http://geodesic.mathdoc.fr/item/PDM_2022_4_a5/
[1] Bluetooth Specification, version 1.2, Bluetooth$^{\mathrm{TM}}$, 2003, 903–948 http://www.bluetooth.org
[2] Briceno M., Goldberg I., and Wagner D., A pedagogical implementation of A5/1, 1999 https://cryptome.org/jya/a51-pi.htm
[3] Ekdahl P. and Johansson T., “A new version of the stream cipher SNOW”, LNCS, 2595, 2003, 47–61 | MR
[4] Hell M., Johansson T., and Meier W., “Grain: stream cipher for constrained environments”, Int. J. Wireless Mobile Computing, 2:1 (2007), 86–93 | DOI
[5] Siegenthaler T., “Decrypting a class of stream cipher using ciphertext only”, IEEE Trans. Comput., C-34:1 (1985), 81–85 | DOI
[6] Meier W. and Staffelbach O., “Fast correlation attacks on certain stream cipher”, J. Cryptology, 1:3 (1989), 159–176 | DOI | MR
[7] Courtois N. and Meier W., “Algebraic attacks on stream ciphers with linear feedback”, LNCS, 2656, 2003, 345–359 | MR
[8] Courtois N., “Fast algebraic attacks on stream ciphers with linear feedback”, LNCS, 2729, 2003, 176–194 | MR
[9] Logachev O. A., Sal'nikov A. A., and Yashchenko V. V., “Correlation immunity and real secrecy”, Matematika i Bezopasnost' Informatsionnykh Tekhnologiy, MCCME Publ., M., 2004, 165–171 (in Russian)
[10] Alekseev E. K. and Kushchinskaya L. A., “Generalization of one method of a filter generator key recovery”, Discrete Math. Appl., 29:2 (2019), 69–87 | DOI | MR
[11] Glukhov M. M., Elizarov V. P., and Nechaev A. A., Algebra, v. 1, Gelios ARV Publ., M., 2003, 416 pp.
[12] Feller V., An Introduction to Probability Theory and its Applications, v. 1, Mir Publ., M., 1984 | MR
[13] Mills J. P., “Table of the ratio: area to bounding ordinate, for any portion of normal curve”, Biometrika, 18:3/4 (1986), 395–400
[14] Gasull A. and Utzet F., “Approximating Mills ratio”, J. Math. Anal. Appl., 420:2 (2014), 1832–1853 | DOI | MR
[15] GOST R 34.12–2015. Information Technology. Information Security. Block Ciphers, Standartinform Publ., M., 2015 (in Russian)