Linear feedback shift register break

broken image

World Academy of Science, Engineering and Technology, 553–560 (2007)

broken image

Garg, P., Shastri, A.: An Improved Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm. Wseas Transactions on Computers 10(1) (2011)īergmann, K.P.: Cryptanalysis Using Nature-Inspired Optimization Algorithms, master’s thesis (2007) Journal of the University of Thi Qar 6, 1–6 (2011)Īhmad, A., Hayat, L.: Selection of Polynomials for Cyclic Redundancy Check for the use of High Speed Embedded – An Algorithmic Procedure. Abd, A.A., Younis, H.A., Awad, W.S.: Attacking of stream Cipher Systems Using a Genetic Algorithm.

broken image