참고문헌
- eSTREAM: eSTREAM – The ECRYPT Stream Cipher Project: , http://www.ecrypt.eu.org/stream/
- J. Borghoff, L. R. Knudsen, M. Stolpe, “Bivium as a Mixed-Integer Linear Programming Problem”, Cryptography and Coding, Lecture Notes in Computer Science, Vol.5921, Springer, 2009, pp.133-152. https://doi.org/10.1007/978-3-642-10868-6_9
- C. De Canniere, B. Preneel, “TRIVIUM – a stream cipher construction inspired by block cipher design principles”, new stream cipher designs: the eSTREAM finalists, Lecture Notes in Computer Science, Vol.4986, Springer, 2008, pp.244-266.
- C. McDonald, C. Charnes, J. Pieprzyk, “Attacking Bivium with MiniSat”, Cryptology ePrint Archive, Report 2007/040, 2007.
- A. Maximov, A. Biryukov, “Two Trivial Attacks on Trivium”, Selected Areas in Cryptography, Lecture Notes in Computer Science, Vol.4876, Springer, 2007, pp.36-55. https://doi.org/10.1007/978-3-540-77360-3_3
- H. Ahmadi, T. Eghlidos, “Heuristic Guess-and-Determine Attacks on Stream Ciphers”, IET Journal in Information Security, Vol.3, 2009, pp.66-73. https://doi.org/10.1049/iet-ifs.2008.0013
- P. Hawkes, G. Rose, The t-class of SOBER stream ciphers, Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, DrummoyneNSW 2137, Australia, 1999.
- P. Hawkes, G. Rose, “Guess and Determine Attacks on SNOW”, Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 2595, Springer, 2002, pp.37-46.
- J. Hastad, M. Naslund, “The Stream Cipher Polar Bear”, eSTREAM, ECRYPT Stream Cipher Project Report 2005/021, 2005, http://www.ecrypt.eu.org/stream/, accessed June, 2008.
- S. Babbage, “Some Thoughts on Trivium”, eSTREAM, ECRYPT Stream Cipher. Project, Report 2007/007 (2007),http://www.ecrypt.eu.org/stream.
- D. Denning, Cryptography and Data Security, Addison-Wesley, May, 1982.
- H.Raddum, “Cryptanalytic Results on Trivium”, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039, 2006. http://www.ecrypt.eu.org/stream.
- Z. Noferesti, N. Rohani, J. Mohajeri, M. Aref, “Distinguishing Attack on Bivium”, 10th IEEE International Conference on Computer and Information Technology, UK, 2010, pp.1075-1078.