Topics

No keywords indexed for this article. Browse by subject →

References
17
[1]
B. Allailou, Conception et Evaluation des Générateurs d’Aléa, PHD thesis (In French), Paris 8, (2010)
[2]
B. Allailou, A. Marjane and A. Mokrane, Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs. In: Y. Chung, M. Yung (eds) Information Security Applications. WISA 2010. Lecture Notes in Computer Science, vol 6513. Springer, Berlin, Heidelberg. (2011), 76–91 10.1007/978-3-642-17955-6_6
[3]
Arnault, F., Berger, T.P.: Design and properties of a new pseudorandom generator based on a filtered FCSR automaton. IEEE Trans. Inf. Theory 54(11), 1374–1383 (2005)
[4]
F. Arnault, T.P. Berger and M. Minier, On the security of FCSR-based pseudorandom generators, SASC, the state of the Art of Stream Ciphers. BOCHUM, Germany. Jan (2007), 179–190
[5]
Arnault, F., Berger, T.P., Minier, M.: Some results on FCSR automata with applications to the security of FCSR-based pseudorandom generators. IEEE Trans. Inf. Theory 54(2), 836–840 (2008) 10.1109/tit.2007.913244
[6]
T.P. Berger and M. Minier, Cryptanalysis of pseudo-random generators based on vectorial FCSRs, Galbraith and M.Nandi (Eds.): INDOCRYPT 2012, LNCS 7668. Springer, Berlin, Heidelberg. (2012), 209–224 10.1007/978-3-642-34931-7_13
[7]
M. Goresky and A. Klapper, Algebraic Shift Register Sequences, Combridge University Press, (2012) 10.1017/cbo9781139057448
[8]
M. Goresky and A. Klapper, Feedback registers based on ramified extensions of the 2-adic numbers (Extended abstract), In: De Santis, Alfredo (ed.), Advances in cryptology - EUROCRYPT 94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9–12, 1994. Proceedings, 950. Berlin: Springer-Verlag. (1995), 215–222 10.1007/bfb0053437
[9]
M. Hell and T. Johansson, Breaking the F-FCSR-H stream cipher in real time Pieprzyk, Josef (ed.), Advances in cryptology - ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008 10.1007/978-3-540-89255-7_34
[10]
L. Jiao, Y. Hao and D. Feng, Stream cipher designs, Sci. China: Inf. Sci., 63(3). (2020), 131101. https://doi.org/10.1007/s11432-018-9929-x.2021.1914775 10.1007/s11432-018-9929-x
[11]
A. Klapper, Feedback with Carry Shift Registers over Finite Fields(extended abstract), In: Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14–16 December 1994, Proceedings, 1008. Springer (1994), 170–178 10.1007/3-540-60590-8_14
[12]
A. Klapper and M. Goresky, 2-adic shift registers, In: Anderson, Ross (ed.), Fast software encryption. FSE93. Cambridge, GB, December 9–11, 1993. Proceedings, 809. Berlin: Springer. (1994), 174–178 10.1007/3-540-58108-1_21
[13]
A. Marjane, Conception Vectorielle de Registre à rétroaction avec retenue sur les corps finis, Paris-Nord university - Paris XIII, PHD thesis (In French), (2011)
[14]
A. Marjane and B. Allailou, Vectoriel Conception of FCSR, In: Carlet, C., Pott, A. (eds) Sequences and Their Applications - SETA, 6338. Springer, Berlin, Heidelberg. (2010), 240–252. https://doi.org/10.1007/978-3-642-15874-2-20 10.1007/978-3-642-15874-2_20
[15]
P.R. Mishra and S.C. Ramola, FCSR connection integers: efficient generation, testing and counting, Cryptologia, 46(5). (2021), 439–460. https://doi.org/10.1080/01611194.2021.1914775 10.1080/01611194.2021.1914775
[16]
Solomon and W. Golomb, Shift register sequences, Aegean Park Press (1982)
[17]
Zierler, N.: Linear recurring sequences. J. Soc. Ind. Appl. Math. 7(1), 31–48 (1959) 10.1137/0107003
Metrics
0
Citations
17
References
Details
Published
Apr 01, 2026
License
View
Cite This Article
Manel Bouhnik, Abdallah Derbal, Abdellah Mokrane, et al. (2026). Pseudo-random number generators based on quartic vectorial FCSR. Cryptography and Communications. https://doi.org/10.1007/s12095-026-00881-3