#### Filter Results:

- Full text PDF available (7)

#### Publication Year

1997

2018

- This year (1)
- Last 5 years (1)
- Last 10 years (2)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Stefan Mangard, Thomas Popp, Berndt M. Gammel
- CT-RSA
- 2005

There are many articles and patents on the masking of logic gates. However, the existing publications assume that a masked logic gate switches its output no more than once per clock cycle.… (More)

- Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten
- CT-RSA
- 2007

Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing… (More)

- Berndt M. Gammel, Rainer Göttfert, O. Kniffler
- IEEE International Symposium on Circuits and…
- 2006

We propose a hardware oriented 80-bit-key binary additive stream cipher. The keystream generator consists of ten nonlinear feedback shift registers whose output sequences are combined by a Boolean… (More)

We determine the imbalances of the keystreams produced by Achterbahn-80 and Achterbahn-128 in two different ways. The number of cyclically inequivalent keystreams produced by the keystream generators… (More)

- Berndt M. Gammel
- 1998

The rescaled range statistical analysis ( R/S) is proposed as a method to detect correlations in pseudorandom number generators used in Monte Carlo simulations. In an extensive test it is… (More)

- Berndt M. Gammel
- 2005

- Berndt M. Gammel, Rainer Göttfert
- WCC
- 2005

Nonlinear n-stage feedback shift-register sequences over the finite field Fq of period q n − 1 are investigated under linear operations on sequences. We prove that all members of an easily described… (More)

We report on the results of computations concerning the linear complexities of the NLFSRs deployed in Achterbahn’s keystream generator. We outline a probabilistic algorithm for estimating the linear… (More)

The Boolean combining function in the 80-bit-key stream cipher Achterbahn [1] is weak. Its major weakness consists of the fact that by setting two specific variables to zero, the function becomes… (More)