Random mappings with constraints on coalescence and number of origins, Pacific Journal of Mathematics, vol.103, issue.2, pp.269-294, 1982. ,
DOI : 10.2140/pjm.1982.103.269
Design and properties of a new pseudorandom generator based on a filtered FCSR automaton, IEEE Trans. Computers, vol.54, issue.11, pp.1374-1383, 2005. ,
F-FCSR: Design of a New Class of Stream Ciphers, Fast Software Encryption -FSE 2005, pp.83-97, 2005. ,
DOI : 10.1007/11502760_6
URL : https://hal.archives-ouvertes.fr/hal-00068453
Correction to "feedback with carry shift registers synthesis with the euclidean algorithm, IEEE Transactions on Information Theory, vol.54, issue.1, pp.910-917502, 2008. ,
Update on F-FCSR stream cipher. eSTREAM, ECRYPT Stream Cipher Project, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00068476
F-FCSR Stream Ciphers, New Stream Cipher Designs, pp.170-178, 2008. ,
DOI : 10.1007/978-3-540-68351-3_13
URL : https://hal.archives-ouvertes.fr/hal-00336871
X-FCSR ??? A New Software Oriented Stream Cipher Based Upon FCSRs, Progress in Cryptology - INDOCRYPT 2007, pp.341-350, 2007. ,
DOI : 10.1007/978-3-540-77026-8_26
URL : https://hal.archives-ouvertes.fr/hal-00336867
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators, IEEE Transactions on Information Theory, vol.54, issue.2, pp.836-840, 2008. ,
DOI : 10.1109/TIT.2007.913244
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures, Progress in Cryptology -INDOCRYPT 2002, pp.22-33, 2002. ,
DOI : 10.1007/3-540-36231-2_3
URL : https://hal.archives-ouvertes.fr/hal-00068427
Feedback With Carry Shift Registers Synthesis With the Euclidean Algorithm, IEEE Transactions on Information Theory, vol.50, issue.5, pp.910-917, 2004. ,
DOI : 10.1109/TIT.2004.826651
URL : https://hal.archives-ouvertes.fr/hal-00068422
Improved ???exhaustive search??? attacks on stream ciphers, European Convention on Security and Detection, pp.161-166, 1995. ,
DOI : 10.1049/cp:19950490
Sosemanuk, a Fast Software-Oriented Stream Cipher, New Stream Cipher Designs, pp.98-118, 2008. ,
DOI : 10.1007/978-3-540-68351-3_9
URL : https://hal.archives-ouvertes.fr/hal-00328825
Decimations of $\ell$-Sequences and Permutations of Even Residues $\modp$, SIAM Journal on Discrete Mathematics, vol.23, issue.2, pp.842-857, 2009. ,
DOI : 10.1137/080737678
Improving a Poor Random Number Generator, ACM Transactions on Mathematical Software, vol.2, issue.1, pp.59-64, 1976. ,
DOI : 10.1145/355666.355670
The stream cipher MICKEY (version 1). eSTREAM, ECRYPT Stream Cipher Project, Report, vol.015, 2005. ,
The MICKEY Stream Ciphers The eS- TREAM Finalists, New Stream Cipher Designs, pp.20-38, 2008. ,
Algebraic Coding Theory, chapter 7 and 10, 1968. ,
Nonbinary BCH decoding (Abstr.), IEEE Transactions on Information Theory, vol.14, issue.2, p.242, 1968. ,
DOI : 10.1109/TIT.1968.1054109
The Salsa20 Family of Stream Ciphers The eSTREAM Finalists, New Stream Cipher Designs, pp.84-97 ,
Random maps, coalescing saddles, singularity analysis, and Airy phenomena, Random Structures and Algorithms, vol.15, issue.3, pp.3-4194, 2001. ,
DOI : 10.1002/rsa.10021
URL : https://hal.archives-ouvertes.fr/inria-00108014
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information, Advances in Cryptology -CRYPTO'84, pp.289-302, 1984. ,
DOI : 10.1007/3-540-39568-7_23
A high-speed oscillator-based truly random number source for cryptographic applications on a smartcard IC, IEEE Transactions on Computers, vol.52, issue.4, pp.403-409, 2003. ,
DOI : 10.1109/TC.2003.1190581
Two algebraic attacks against the F- FCSRs using the IV mode, Progress in Cryptology -INDOCRYPT 2005, pp.143-154, 2005. ,
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, Advances in Cryptology - ASIACRYPT 2000, pp.1-13, 1976. ,
DOI : 10.1007/3-540-44448-3_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.7615
The Rabbit Stream Cipher The eSTREAM Finalists, New Stream Cipher Designs, pp.68-83, 2008. ,
Stream Ciphers and Number Theory. North-Holland Mathematic Library, 1998. ,
Dragon: A Fast Word Based Stream Cipher, Lecture Notes in Computer Science, vol.3506, pp.33-50, 2004. ,
DOI : 10.1007/11496618_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.426.4914
A simple algorithm for fast correlation attacks on stream ciphers, Fast Software Encryption -FSE 2000, pp.181-195, 1978. ,
On the lattice structure of certain linear congruential sequences related to AWC/SWB generators, Mathematics of Computation, vol.62, issue.206, pp.799-808, 1994. ,
DOI : 10.1090/S0025-5718-1994-1220826-X
Distribution properties of multiply-with-c arry random number
generators, Mathematics of Computation, vol.66, issue.218, pp.591-607, 1997. ,
DOI : 10.1090/S0025-5718-97-00827-2
Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology -EUROCRYPT 2003, pp.345-359 ,
DOI : 10.1007/3-540-39200-9_21
An improved distinguisher for dragon. eSTREAM, ECRYPT Stream Cipher Project, 2007. ,
Elements of Information Theory, 1991. ,
Cryptography and data security, 1982. ,
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues, New Stream Cipher Designs, pp.20-38, 2008. ,
DOI : 10.1007/978-3-540-68351-3_3
Bad and Good Ways of Post-processing Biased Physical Random Numbers, Lecture Notes in Computer Science, vol.4593, pp.137-152, 2007. ,
DOI : 10.1007/978-3-540-74619-5_9
Methods for Studying Coincidences, Journal of the American Statistical Association, vol.4, issue.15, pp.853-861, 1989. ,
DOI : 10.1080/01621459.1989.10478847
Images and Preimages in Random Mappings, SIAM Journal on Discrete Mathematics, vol.10, issue.2, pp.246-269, 1997. ,
DOI : 10.1137/S0895480194268421
Approximation lattices of p-adic numbers, J. Number Theory, vol.24, issue.1, pp.70-88, 1979. ,
Attack the Dragon, Progress in Cryptology -INDOCRYPT 2005, pp.130-142, 2005. ,
DOI : 10.1007/11596219_11
A Truly Random Number Generator Based on a Continuous-Time Chaotic Oscillator for Applications in Cryptography, Lecture Notes in Computer Science, vol.3733, pp.205-214, 2005. ,
DOI : 10.1007/11569596_23
A hybrid of Darboux's method and singularity analysis in combinatorial asymptotics, Electr. J. Comb, vol.13, issue.1, 2006. ,
Singularity analysis, Hadamard products, and tree recurrences, Journal of Computational and Applied Mathematics, vol.174, issue.2, pp.271-313, 2005. ,
DOI : 10.1016/j.cam.2004.04.014
URL : http://doi.org/10.1016/j.cam.2004.04.014
Decimation Attack of Stream Ciphers, Progress in Cryptology -INDOCRYPT 2000, pp.31-42, 2000. ,
DOI : 10.1007/3-540-44495-5_4
URL : https://hal.archives-ouvertes.fr/inria-00072656
Singularity analysis and asymptotics of Bernoulli sums, Theoretical Computer Science, vol.215, issue.1-2, pp.371-381, 1999. ,
DOI : 10.1016/S0304-3975(98)00220-5
URL : https://hal.archives-ouvertes.fr/inria-00073289
Equivalent representations of the F-FCSR keystream generator, SASC 2008, pp.87-96, 2008. ,
Random Mapping Statistics, Advances in Cryptology -EUROCRYPT'89, pp.329-354, 1989. ,
DOI : 10.1007/3-540-46885-4_34
URL : https://hal.archives-ouvertes.fr/inria-00075445
Singularity Analysis of Generating Functions, SIAM Journal on Discrete Mathematics, vol.3, issue.2, pp.216-240, 1990. ,
DOI : 10.1137/0403019
URL : https://hal.archives-ouvertes.fr/inria-00075725
Analytic Combinatorics. preprint, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00072739
A Generalization of the Berlekamp- Massey Algorithm for Multisequence Shift-Register Synthesis with Applications to Decoding Cyclic Codes, IEEE Transactions on Information Theory, vol.37, issue.5, pp.1274-1287, 1991. ,
Disquisitiones Arithmeticae. reprinted in 1965 by, 1801. ,
Hardware results for selected stream cipher candidates. eSTREAM, ECRYPT Stream Cipher Project, Report, vol.023, 2007. ,
Feedback registers based on ramified extensions of the 2-adic numbers, Advances in Cryptology -EUROCRYPT'94, pp.215-222, 1994. ,
DOI : 10.1007/BFb0053437
Arithmetic crosscorrelations of feedback with carry shift register sequences, IEEE Transactions on Information Theory, vol.43, issue.4, pp.1342-1345, 1997. ,
DOI : 10.1109/18.605605
Fibonacci and Galois representations of feedback-with-carry shift registers, IEEE Transactions on Information Theory, vol.48, issue.11, pp.2826-2836, 2002. ,
DOI : 10.1109/TIT.2002.804048
Efficient multiply-with-carry random number generators with maximal period, ACM Transactions on Modeling and Computer Simulation, vol.13, issue.4, pp.310-321, 2003. ,
DOI : 10.1145/945511.945514
Periodicity and Correlation Properties of d-FCSR Sequences, Designs, Codes and Cryptography, vol.33, issue.2, pp.123-148, 2004. ,
DOI : 10.1023/B:DESI.0000035467.93014.90
Periodicity and Distribution Properties of Combined FCSR Sequences, Sequences and Their Applications - SETA 2006, pp.334-341 ,
DOI : 10.1007/11863854_29
Algebraic Shift Register Sequences. preprint, 2008. ,
DOI : 10.1017/cbo9781139057448
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.1304
On Decimations of $\ell$-Sequences, SIAM Journal on Discrete Mathematics, vol.18, issue.1, pp.130-140, 2004. ,
DOI : 10.1137/S0895480102403428
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
Shift Register Sequences, 1981. ,
A note on computational indistinguishability, Information Processing Letters, vol.34, issue.6, pp.277-281, 1990. ,
DOI : 10.1016/0020-0190(90)90010-U
Cryptanalysis of alleged A5 stream cipher, Advances in Cryptology -EUROCRYPT'97, pp.239-255, 1997. ,
Randomness and the Netscape browser, Dr. Dobbs Journal, Jannuary, 1996. ,
Transmission of information, Bell System Technical Journal, vol.7, issue.4, pp.535-563, 1928. ,
Probability distributions related to random mappings. The Annals of Mathematical Statistics, pp.1045-1062, 1960. ,
DOI : 10.1214/aoms/1177705677
A cryptanalytic time-memory trade-off, IEEE Transactions on Information Theory, vol.26, issue.4, pp.401-406, 1980. ,
Breaking the F-FCSR-H Stream Cipher in Real Time, Advances in Cryptology -ASIACRYPT 2008, pp.557-569, 2008. ,
DOI : 10.1007/3-540-58108-1_21
The Grain Family of Stream Ciphers, New Stream Cipher Designs, pp.179-190, 2008. ,
DOI : 10.1007/978-3-540-68351-3_14
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY, Progress in Cryptology -IN- DOCRYPT 2005, pp.169-182, 2005. ,
DOI : 10.1007/11596219_14
Computer Architecture -A Quantitative Approach, 2002. ,
New Applications of Time Memory Data Tradeoffs, Advances in Cryptology -ASIACRYPT 2005, pp.353-372, 2005. ,
DOI : 10.1007/11593447_19
Chosen Ciphertext Attack on SSS. eSTREAM, ECRYPT Stream Cipher Project, Report, vol.044, 2005. ,
Random number generation by chaotic double scroll oscillator on chip, ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349), pp.407-409, 1999. ,
DOI : 10.1109/ISCAS.1999.777595
Cryptanalysis of ECRYPT candidates F- FCSR-8 and F-FCSR-H. eSTREAM, ECRYPT Stream Cipher Project, Report, vol.046, 2005. ,
Cryptanalysis of the F-FCSR Stream Cipher Family, Selected Areas in Cryptography, pp.20-35, 2005. ,
DOI : 10.1007/11693383_2
Chosen-Ciphertext Attacks Against MOSQUITO, Lecture Notes in Computer Science, vol.4047, pp.390-404, 2006. ,
DOI : 10.1007/11799313_25
2-Adic shift registers, Fast Software Encryption -FSE'93, pp.174-178, 1993. ,
DOI : 10.1007/3-540-58108-1_21
Cryptanalysis Based on 2-Adic Rational Approximation, Advances in Cryptology - CRYPTO'95, pp.262-273, 1995. ,
DOI : 10.1007/3-540-44750-4_21
Large Period Nearly deBruijn FCSR Sequences, Advances in Cryptology -EUROCRYPT'95, pp.263-273, 1995. ,
DOI : 10.1007/3-540-49264-X_21
Feedback shift registers, 2-adic span, and combiners with memory, Journal of Cryptology, vol.25, issue.2, pp.111-147, 1997. ,
DOI : 10.1007/s001459900024
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.5637
Feedback with carry shift registers over finite fields, Fast Software Encryption -FSE'94, pp.170-178, 1994. ,
DOI : 10.1007/3-540-60590-8_14
Distributional properties of d-FCSR sequences, Journal of Complexity, vol.20, issue.2-3, pp.305-317, 2004. ,
DOI : 10.1016/j.jco.2003.08.016
Expected ??-Adic Security Measures of Sequences, Sequences and Their Applications -SETA, pp.219-229, 2008. ,
DOI : 10.1007/978-3-540-85912-3_20
The Art of Computer Programming, Volume II: Seminumerical Algorithms, 1981. ,
Random Mappings. Optimization Software, 1986. ,
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator, Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, pp.13-33 ,
DOI : 10.1007/3-540-46513-8_2
Feedback with carry shift registers over Z/(n), Sequences and Their Applications -SETA'89, pp.379-392, 1989. ,
Algebraic feedback shift registers, Theoretical Computer Science, vol.226, issue.1-2, pp.61-92, 1999. ,
DOI : 10.1016/S0304-3975(99)00066-3
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes, Designs, Codes and Cryptography, vol.31, issue.3, pp.227-250, 2004. ,
DOI : 10.1023/B:DESI.0000015886.71135.e1
Post-Processing Functions for a Biased Physical Random Number Generator, Fast Software Encryption -FSE 2008, pp.334-342, 2008. ,
DOI : 10.1007/978-3-540-71039-4_21
High Speed Generation of Maximal Length Sequences, IEEE Transactions on Computers, vol.20, issue.2, pp.227-229, 1971. ,
DOI : 10.1109/T-C.1971.223220
Uniform random number generators, WSC '98: Proceedings of the 30th conference on Winter simulation, pp.97-104, 1998. ,
Parallel Generation of ???-Sequences, Sequences and Their Applications -SETA 2008, pp.299-312, 2008. ,
DOI : 10.1007/978-3-540-85912-3_27
Yet another RNG. Posted to electronic bulletin board sci, stat.math, 1994. ,
Diehard battery of tests of randomness Available from http, 1995. ,
Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol.15, issue.1, pp.122-127, 1969. ,
DOI : 10.1109/TIT.1969.1054260
Linear cryptoanalysis method for des cipher, EURO- CRYPT, pp.386-397, 1993. ,
A universal statistical test for random bit generators, J. Cryptology, vol.5, issue.2, pp.89-105, 1992. ,
Finite field for scientists and engineers, 1987. ,
Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator, ACM Transactions on Modeling and Computer Simulation, vol.8, issue.1, pp.3-30, 1998. ,
DOI : 10.1145/272991.272995
Cramming more components onto integrated circuits Available from http, Electronics, vol.38, issue.8, pp.114-117, 1965. ,
Bounds to complexities of networks for sorting and switching, JACM, vol.22, pp.1531-1540, 1975. ,
Linear ciphers and random sequence generators with multiple clocks, Advances in Cryptology -EUROCRYPT'84, pp.74-87, 1984. ,
Method of, and apparatus for, transforming a digital data sequence into an encoded form, U. S. Patent Office US Patent, vol.4797, p.922, 1989. ,
Fast correlation attacks on certain stream ciphers, Journal of Cryptology, vol.34, issue.3, pp.159-176, 1989. ,
DOI : 10.1007/BF02252874
Limit theorem concerning random mapping patterns, Combinatorica, vol.8, issue.4, pp.345-356, 1988. ,
The limit distribution of the number of nodes in low strata of a random mapping, Statist. Prabab. Lett, vol.7, issue.3, pp.247-251, 1989. ,
Handbook of Applied Cryptography, pp.0-8493, 1996. ,
DOI : 10.1201/9781439821916
A New Class of Random Number Generators, The Annals of Applied Probability, vol.1, issue.3, pp.462-480, 1991. ,
DOI : 10.1214/aoap/1177005878
New European Schemes for Signatures, Integrity, and Encryption ,
Random number generation and quasi-Monte Carlo methods, Society for Industrial and Applied Mathematics, 1992. ,
DOI : 10.1137/1.9781611970081
Improved Linear Distinguishers for SNOW 2.0, Fast Software Encryption -FSE 2006, pp.144-162, 2006. ,
DOI : 10.1007/11799313_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.1074
NESSIE Project, Encyclopedia of Cryptography and Security, 2005. ,
DOI : 10.1007/0-387-23483-7_271
Cycle length in a random function. Transactions of the, pp.547-551, 1968. ,
Other Cycling Tests for DES, Advances in Cryptology -CRYPTO'87, pp.255-256, 1988. ,
DOI : 10.1007/3-540-48184-2_23
How easy is collision search. New results and applications to DES, Advances in Cryptology -CRYPTO'89, pp.408-413, 1989. ,
DOI : 10.1007/0-387-34805-0_38
Attaques par collision basées sur la perte d'entropie causée par des fonctions aléatoires, MajecSTIC, pp.115-124, 2007. ,
The impact of entropy loss caused by random functions, Western European Workshop on Research in Cryptology, pp.130-135, 2007. ,
Entropy of the Internal State of an FCSR in Galois Representation, Lecture Notes in Computer Science, vol.5086, pp.343-362, 2008. ,
DOI : 10.1007/978-3-540-71039-4_22
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State, Lecture Notes in Computer Science, vol.5023, pp.258-275, 2008. ,
DOI : 10.1007/978-3-540-68164-9_18
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication, pp.800-822, 2001. ,
DOI : 10.6028/NIST.SP.800-22
Analysis and design of stream ciphers, 1986. ,
Windmill generators: A generalization and an observation of how many there are, Advances in Cryptology -EUROCRYPT'88, pp.325-330, 1988. ,
Applied cryptography): protocols, algorithms, and source code in C, 1995. ,
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Stream Ciphers: Dead or Alive?, Advances in Cryptology -ASIACRYPT 2004, p.78, 2004. ,
DOI : 10.1007/978-3-540-30539-2_6
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.), IEEE Transactions on Information Theory, vol.30, issue.5, pp.776-780, 1984. ,
DOI : 10.1109/TIT.1984.1056949
HArdware Volatile Entropy Gathering and Expansion: generating unpredictable random numbers at user level, 2002. ,
HAVEGE, ACM Transactions on Modeling and Computer Simulation, vol.13, issue.4, pp.334-346, 2003. ,
DOI : 10.1145/945511.945516
Linear shift-register synthesis for multiple sequences of varying length, IEEE International Symposium on Information Theory -ISIT 2006, pp.1738-1742, 2006. ,
Limit distributions of certain characteristics of random mappings . Theory of Probability and its Applications, 1969. ,
Birthday Paradox for Multi-collisions, Information Security and Cryptology ? ICISC 2006, Proceedings, pp.29-40, 2006. ,
DOI : 10.1007/11927587_5
The Mathematical Theory of Communication, 1949. ,
New Distinguishers Based on Random Mappings against Stream Ciphers, Sequences and Their Applications -SETA 2008, pp.30-41, 2008. ,
DOI : 10.1007/978-3-540-85912-3_3
Energy and Information, Scientific American, vol.225, issue.3, pp.179-188, 1971. ,
DOI : 10.1038/scientificamerican0971-179
-Sequences, SIAM Journal on Discrete Mathematics, vol.23, issue.2, pp.805-821, 2009. ,
DOI : 10.1137/080721200
URL : https://hal.archives-ouvertes.fr/hal-00807357
ENT a pseudorandom number sequence test program Available from http, 1998. ,
HotBits: Genuine random numbers, generated by radioactive decay, september, 2006. ,
Generalized ?-Divergence and Frequency Analysis in Markov Chains, 1998. ,
Entropy estimators and serial tests for ergodic chains, IEEE Transactions on Information Theory, vol.47, issue.6, pp.2480-2489, 2001. ,
DOI : 10.1109/18.945259
The Stream Cipher HC-128, New Stream Cipher Designs, pp.39-47, 2008. ,
DOI : 10.1007/978-3-540-68351-3_4
Further Results on the Distinctness of Decimations of<tex>$l$</tex>-Sequences, IEEE Transactions on Information Theory, vol.52, issue.8, pp.3831-3836, 2006. ,
DOI : 10.1109/TIT.2006.878181
Linear Recurring Sequences, Journal of the Society for Industrial and Applied Mathematics, vol.7, issue.1, pp.31-48, 1959. ,
DOI : 10.1137/0107003
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers, Progress in Cryptology -INDOCRYPT 2004 List of Figures 1.1 Statue of Claude E, pp.73-83, 2004. ,
DOI : 10.1007/978-3-540-30556-9_7
Multiple steps generator for a, p.150 ,
Multiple steps generator for a, p.151 ,
Multiple steps generator for a, p.154 ,
Multiple steps generator for a, p.156 ,