# Summation generator

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2009

2009

- Fourth International Conference on Computerâ€¦
- 2009

The NLM family of keystream generator is based on the LM-type summation generator. A nonlinear feedback shift register is addedâ€¦Â (More)

Is this relevant?

2007

2007

- International Conference on Convergenceâ€¦
- 2007

In 1986, Rueppel has pioneered the notion of summation generator and shown that the proposed summation generator obtained maximumâ€¦Â (More)

Is this relevant?

2005

2005

- IACR Cryptology ePrint Archive
- 2005

The need of software-flexible stream ciphers has led to several alternative proposals in the last few years. One of them is a newâ€¦Â (More)

Is this relevant?

2005

2005

- IEEE Transactions on Computers
- 2005

Feedback with carry shift registers (FCSR) was introduced by Goresky and Klapper in 1993. It is similar to the classical linearâ€¦Â (More)

Is this relevant?

2003

2003

- IACR Cryptology ePrint Archive
- 2003

We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses nâ€¦Â (More)

Is this relevant?

2003

2003

- 2003

J. Dj. GoliÄ‡ applied linear sequential circuit approximation (LSCA) method to analyze the summation generator with an arbitraryâ€¦Â (More)

Is this relevant?

2002

2002

- Signal Processing
- 2002

The conventional summation generator (SG) has been broken in the past using a number of di/erent methods. Recently, a modi0ed SGâ€¦Â (More)

Is this relevant?

2000

2000

- Signal Processing
- 2000

The summation generator is a real adder generator with a maximum period, near-maximum linear complexity and maximum order ofâ€¦Â (More)

Is this relevant?

2000

2000

- Journal of Cryptology
- 2000

The linear sequential circuit approximation method for combiners with memory is used to find mutually correlated linearâ€¦Â (More)

Is this relevant?

1996

1996

- IEEE Trans. Computers
- 1996

It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modeled as a nonautonomous linearâ€¦Â (More)

Is this relevant?