Abstract
A number of keystream generators can be attacked by guessing the contents of one shift register and then checking to see whether this guess is consistent with the observed keystream. Where the target register is n bits long, this gives an attack of complexity 2n−o(1). In the Letter a further optimisation is presented which appears to reduce the complexity to about 2n/2 in many cases of practical interest.

This publication has 2 references indexed in Scilit: