In Proc. of ACISP 2006, LNCS, volume 4058, pages
1–16. Springer Verlag.
Babbage, S. and Dodd, M. (2005). The stream ci-
pher MICKEY-128 2.0. Article for eSTREAM
Project, available at http://www.ecrypt.
eu.org/stream/p2ciphers/mickey128/
mickey128\_p2.pdf.
Billet, O. and Gilbert, H. (2005). Resistance of SNOW 2.0
against algebraic attacks. In Proc. of CT-RSA 2005,
LNCS, volume 3376, pages 19–28. Springer Verlag.
Chepyzhov, V., Johansson, T., and Smeets, B. (2001). A
simple algorithm for fast correlation attacks on stream
ciphers. In Proc. of FSE’00, LNCS, volume 1978,
pages 181–195. Springer Verlag.
Courtois, N. (2005). Algebraic attacks on combiners with
memory and several outputs. In Proc. of ICISC 2004,
LNCS, volume 3506, pages 3–20. Springer Verlag.
Daemen, J. and Rijmen, V. (1998). The Design of Rijn-
dael, Information Security and Cryptography, Texts
and Monographs. Springer Verlag.
Ekdahl, P. and Johansson, T. (2000). Snow -a new stream
cipher. The NESSIE submission paper.
Ekdahl, P. and Johansson, T. (2003). A new version of the
stream cipher SNOW. In Proc. of SAC 2002, LNCS,
volume 2595, pages 47–61. Springer Verlag.
Golic, J. D. (1996). On security of nonlinear filter genera-
tors. In Proc. of FSE ’96, LNCS, volume 1039, pages
173–188. Springer Verlag.
Hong, J. and Sarkar, P. (2005). Rediscovery of time memory
tradeoffs. IACR ePrint Archive, Report 2005/090.
Jansen, C. J., Helleseth, T., and Kholosha, A. (2005).
Cascade jump controlled sequence generator and
POMARANCH stream cipher. Article for eSTREAM
Project, available at http://www.ecrypt.
eu.org/stream/p2ciphers/pomaranch/
pomaranch\_p2.pdf.
Kiyomoto, S., Tanaka, T., and Sakurai, K. (2007). A
word-oriented stream cipher using clock control.
In SASC 2007 Workshop Record, pages 260–274,
available at
http://sasc.crypto.rub.de/files/
sasc2007_record.zip
.
NESSIE (2003). Nessie final report, parformance of
optimized implementations of the nessie primitives.
NES/DOC/TEC/WP6/D21/2.
Nyberg, K. and Wallen, J. (2006). Improved linear distin-
guishers for SNOW 2.0. In Proc. of FSE 2006, LNCS,
volume 4047, pages 144–162. Springer Verlag.
Rose, G. and Hawkes, P. (1999). The t-class of sober stream
cipher. Publication Document, QUALCOMM Aus-
tralia.
Simpson, L., Dawson, E., Golic, J., and Millan, W. (2000).
LILI keystream generator. In Proc. of SAC 2000,
LNCS, volume 2012, pages 248–261. Springer Verlag.
Zenner, E. (2003). On the efficiency of the clock control
guessing attack. In Proc. of ICISC’02, LNCS, volume
2587, pages 200–212. Springer Verlag.
Zenner, E. (2004). On the role of the inner state size in
stream ciphers. Reihe Informatik 01-2004.
A MATRIX OF α
i
M
α
1
is the 32× 32 matrix over GF(2) given by
10001101100000000000000000000000
11000110010000000000000000000000
11100011001000000000000000000000
11111100000100000000000000000000
11111110000010000000000000000000
01110010000001000000000000000000
00110100000000100000000000000000
00011010000000010000000000000000
00110111000000001000000000000000
10011011000000000100000000000000
01001101000000000010000000000000
10010001000000000001000000000000
11001000000000000000100000000000
11010011000000000000010000000000
11011110000000000000001000000000
01101111000000000000000100000000
00100111000000000000000010000000
10010011000000000000000001000000
11001001000000000000000000100000
01000011000000000000000000010000
10100001000000000000000000001000
01110111000000000000000000000100
10011100000000000000000000000010
01001110000000000000000000000001
01010100000000000000000000000000
10101010000000000000000000000000
01010101000000000000000000000000
01111110000000000000000000000000
10111111000000000000000000000000
00001011000000000000000000000000
01010001000000000000000000000000
10101000000000000000000000000000
SECRYPT 2007 - International Conference on Security and Cryptography
212