Fast Discrete Fourier Spectra Attacks on Stream Ciphers

In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Rønjom-Helleseth attack and the modifications due to Rønjom, Gong, and Helleseth. The first part of this paper fills some gaps in the theory of analysis in terms of the discrete Fou...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information theory Vol. 57; no. 8; pp. 5555 - 5565
Main Authors: Guang Gong, Ronjom, S., Helleseth, T., Honggang Hu
Format: Journal Article
Language:English
Published: New York, NY IEEE 01.08.2011
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9448, 1557-9654
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Rønjom-Helleseth attack and the modifications due to Rønjom, Gong, and Helleseth. The first part of this paper fills some gaps in the theory of analysis in terms of the discrete Fourier transform (DFT). The second part introduces the new fast selective DFT attacks, which are closely related to the fast algebraic attacks in the literature. However, in contrast to the classical view that successful algebraic cryptanalysis of LFSR-based stream cipher depends on the degree of certain annihilators, the analysis in terms of the DFT spectral properties of the sequences generated by these functions is far more refined. It is shown that the selective DFT attack is more efficient than known methods for the case when the number of observed consecutive bits of a filter generator is less than the linear complexity of the sequence. Thus, by utilizing the natural representation imposed by the underlying LFSRs, in certain cases, the analysis in terms of DFT spectra is more efficient and has more flexibility than classical and fast algebraic attacks. Consequently, the new attack imposes a new criterion for the design of cryptographic strong Boolean functions, which is defined as the spectral immunity of a sequence or a Boolean function.
AbstractList In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Roenjom-Helleseth attack and the modifications due to Roenjom, Gong, and Helleseth. The first part of this paper fills some gaps in the theory of analysis in terms of the discrete Fourier transform (DFT). The second part introduces the new fast selective DFT attacks, which are closely related to the fast algebraic attacks in the literature. However, in contrast to the classical view that successful algebraic cryptanalysis of LFSR-based stream cipher depends on the degree of certain annihilators, the analysis in terms of the DFT spectral properties of the sequences generated by these functions is far more refined. It is shown that the selective DFT attack is more efficient than known methods for the case when the number of observed consecutive bits of a filter generator is less than the linear complexity of the sequence. Thus, by utilizing the natural representation imposed by the underlying LFSRs, in certain cases, the analysis in terms of DFT spectra is more efficient and has more flexibility than classical and fast algebraic attacks. Consequently, the new attack imposes a new criterion for the design of cryptographic strong Boolean functions, which is defined as the spectral immunity of a sequence or a Boolean function.
In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Rønjom-Helleseth attack and the modifications due to Rønjom, Gong, and Helleseth. The first part of this paper fills some gaps in the theory of analysis in terms of the discrete Fourier transform (DFT). The second part introduces the new fast selective DFT attacks, which are closely related to the fast algebraic attacks in the literature. However, in contrast to the classical view that successful algebraic cryptanalysis of LFSR-based stream cipher depends on the degree of certain annihilators, the analysis in terms of the DFT spectral properties of the sequences generated by these functions is far more refined. It is shown that the selective DFT attack is more efficient than known methods for the case when the number of observed consecutive bits of a filter generator is less than the linear complexity of the sequence. Thus, by utilizing the natural representation imposed by the underlying LFSRs, in certain cases, the analysis in terms of DFT spectra is more efficient and has more flexibility than classical and fast algebraic attacks. Consequently, the new attack imposes a new criterion for the design of cryptographic strong Boolean functions, which is defined as the spectral immunity of a sequence or a Boolean function.
In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Ronjom-Helleseth attack and the modifications due to Ronjom, Gong, and Helleseth. The first part of this paper fills some gaps in the theory of analysis in terms of the discrete Fourier transform (DFT). The second part introduces the new fast selective DFT attacks, which are closely related to the fast algebraic attacks in the literature. However, in contrast to the classical view that successful algebraic cryptanalysis of LFSR-based stream cipher depends on the degree of certain annihilators, the analysis in terms of the DFT spectral properties of the sequences generated by these functions is far more refined. It is shown that the selective DFT attack is more efficient than known methods for the case when the number of observed consecutive bits of a filter generator is less than the linear complexity of the sequence. Thus, by utilizing the natural representation imposed by the underlying LFSRs, in certain cases, the analysis in terms of DFT spectra is more efficient and has more flexibility than classical and fast algebraic attacks. Consequently, the new attack imposes a new criterion for the design of cryptographic strong Boolean functions, which is defined as the spectral immunity of a sequence or a Boolean function. [PUBLICATION ABSTRACT]
Author Ronjom, S.
Guang Gong
Honggang Hu
Helleseth, T.
Author_xml – sequence: 1
  surname: Guang Gong
  fullname: Guang Gong
  email: ggong@calliope.uwaterloo.ca
  organization: Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
– sequence: 2
  givenname: S.
  surname: Ronjom
  fullname: Ronjom, S.
  email: sondrer@gmail.com
  organization: NSM, Bærum, Norway
– sequence: 3
  givenname: T.
  surname: Helleseth
  fullname: Helleseth, T.
  email: tor.helleseth@ii.uib.no
  organization: Dept. of Inf., Univ. of Bergen, Bergen, Norway
– sequence: 4
  surname: Honggang Hu
  fullname: Honggang Hu
  email: hghu2005@gmail.com
  organization: Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=24415775$$DView record in Pascal Francis
BookMark eNp9kE1rGzEQhkVJoU7ae6GXJRB6Wlejr5WOwanTQKCHuGchaWepkvWuI8mH_PvI2O0hh5yGged9mXnOydk0T0jIV6BLAGp-bO42S0YBlgykFpp-IAuQsmuNkuKMLCgF3Roh9CdynvNjXYUEtiDd2uXS3MQcEhZs1vM-RUzNww5DSa65LsWFp9zMU_NQErpts4q7v5jyZ_JxcGPGL6d5Qf6sf25Wv9r737d3q-v7NnDJSqv7wTPtFVfgueqclND3PKjg_cA8hg5gCNpz71XvqGEOQqDITC8UQ2UGfkG-H3t3aX7eYy52W2_FcXQTzvtsDe0M70DxSl6-IR_rM1M9zmqtqBGSHqCrE-RycOOQ3BRitrsUty69WCYEyK6TlVNHLqQ554SDDbG4EuepWomjBWoP1m21bg_W7cl6DdI3wX_d70S-HSMREf_j0ijQTPBXGSuNdg
CODEN IETTAW
CitedBy_id crossref_primary_10_1007_s10623_016_0212_9
crossref_primary_10_1007_s11767_012_0825_8
crossref_primary_10_1007_s11859_016_1147_8
crossref_primary_10_1007_s12095_013_0091_0
crossref_primary_10_1109_JIOT_2019_2903242
crossref_primary_10_1007_s12095_023_00656_0
crossref_primary_10_1145_2808230
crossref_primary_10_1007_s10623_014_0019_5
crossref_primary_10_1109_ACCESS_2019_2928768
crossref_primary_10_1016_j_ins_2018_03_052
crossref_primary_10_1109_TCAD_2020_3014184
Cites_doi 10.1007/978-3-540-45146-4_10
10.1007/978-3-540-24676-3_28
10.1007/3-540-39200-9_21
10.1016/S0747-7171(08)80013-2
10.1007/978-3-540-45146-4_11
10.1109/TIT.1969.1054260
10.1109/TIT.1987.1057268
10.1007/11554868_3
10.1007/978-3-540-28628-8_24
10.1007/978-3-540-73074-3_20
10.1023/A:1008256920596
10.1007/978-3-540-77404-4_20
10.1109/TIT.2007.894690
10.1017/CBO9780511546907
10.1007/978-3-540-77224-8_2
10.1007/978-3-642-82865-2
ContentType Journal Article
Copyright 2015 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2011
Copyright_xml – notice: 2015 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2011
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TIT.2011.2158480
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database

Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
EISSN 1557-9654
EndPage 5565
ExternalDocumentID 2439295981
24415775
10_1109_TIT_2011_2158480
5961824
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYXX
CITATION
IQODW
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c352t-8dfb28b6361b367a551dd3c6cbbf2bec711fc8b3bb6da092a1cc0e29d462e69f3
IEDL.DBID RIE
ISICitedReferencesCount 19
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000295738500045&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9448
IngestDate Sun Nov 23 09:47:47 EST 2025
Sun Oct 05 00:27:10 EDT 2025
Mon Jul 21 09:13:22 EDT 2025
Sat Nov 29 03:53:12 EST 2025
Tue Nov 18 22:17:42 EST 2025
Tue Aug 26 17:17:02 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords Discrete Fourier transform (DFT)
spectral immunity
Stream ciphering
Fast Fourier transformation
Spectral properties
Discrete Fourier transformation
filter generator
Boolean function
fast algebraic attack
Flexibility
Shift register
Private key
linear feedback shift register (LFSR)
Security of data
Linear complexity
Cryptanalysis
Cryptography
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c352t-8dfb28b6361b367a551dd3c6cbbf2bec711fc8b3bb6da092a1cc0e29d462e69f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 886094503
PQPubID 36024
PageCount 11
ParticipantIDs proquest_miscellaneous_907937163
crossref_primary_10_1109_TIT_2011_2158480
crossref_citationtrail_10_1109_TIT_2011_2158480
ieee_primary_5961824
proquest_journals_886094503
pascalfrancis_primary_24415775
PublicationCentury 2000
PublicationDate 2011-08-01
PublicationDateYYYYMMDD 2011-08-01
PublicationDate_xml – month: 08
  year: 2011
  text: 2011-08-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2011
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref15
beth (ref5) 1984
rnjom (ref23) 2007; 4547
ref18
hawkes (ref12) 2004
golomb (ref14) 1982
gong (ref16) 2008; 5203
meier (ref20) 2004; 3027
ref24
ref26
ref25
ref22
ref21
(ref11) 0
massey (ref19) 1996; 1109
ref27
(ref7) 2001
berlekamp (ref4) 1968
courtois (ref9) 2003; 2729
armknecht (ref1) 2003; 2729
courtois (ref10) 2003; 2656
ref8
blahut (ref6) 1983
armknecht (ref2) 2004; 3017
ref3
macwilliams (ref17) 1977
gollmann (ref13) 1984
References_xml – volume: 1109
  start-page: 358
  year: 1996
  ident: ref19
  article-title: Linear complexity of periodic sequences: A general theory
  publication-title: Advances in Cryptology Proc Crypto 96
– year: 1983
  ident: ref6
  publication-title: Theory and Practice of Error Control Codes
– volume: 2729
  start-page: 162
  year: 2003
  ident: ref1
  article-title: Algebraic attacks on stream combiners with memory
  publication-title: Advances in Cryptology - CRYPTO 2003
  doi: 10.1007/978-3-540-45146-4_10
– volume: 3027
  start-page: 474
  year: 2004
  ident: ref20
  article-title: Algebraic attacks and decomposition of Boolean functions
  publication-title: Advances in CryptologyProc EUROCRYPT 2004
  doi: 10.1007/978-3-540-24676-3_28
– volume: 2656
  start-page: 345
  year: 2003
  ident: ref10
  article-title: Algebraic attacks on stream ciphers with linear feedback
  publication-title: Proc Advances in Cryptology-Eurocrypt'2003
  doi: 10.1007/3-540-39200-9_21
– ident: ref8
  doi: 10.1016/S0747-7171(08)80013-2
– volume: 2729
  start-page: 176
  year: 2003
  ident: ref9
  article-title: Fast algebraic attacks on stream ciphers with linear feedback
  publication-title: Advances in Cryptology - CRYPTO 2003
  doi: 10.1007/978-3-540-45146-4_11
– ident: ref18
  doi: 10.1109/TIT.1969.1054260
– ident: ref27
  doi: 10.1109/TIT.1987.1057268
– ident: ref3
  doi: 10.1007/11554868_3
– year: 1977
  ident: ref17
  publication-title: The Theory of Error-Correcting Codes
– year: 1968
  ident: ref4
  publication-title: Algebraic Coding Theory
– year: 0
  ident: ref11
  publication-title: ESTREAM ECRYPT Stream Cipher Project
– start-page: 390
  year: 2004
  ident: ref12
  article-title: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
  publication-title: Advances in Cryptology CRYPTO 2004
  doi: 10.1007/978-3-540-28628-8_24
– volume: 4547
  start-page: 264
  year: 2007
  ident: ref23
  article-title: Attacking the filter generator over <formula formulatype="inline"><tex Notation="TeX">$GF(2^m)$</tex></formula>
  publication-title: Proc Arithmetic of Finite Fields First International Workshop WAIFA
  doi: 10.1007/978-3-540-73074-3_20
– start-page: 93
  year: 1984
  ident: ref13
  article-title: Pseudo random properties of cascade connections of clock controlled shift registers
  publication-title: Proc Advances in Cryptology-Eurocrypt'1984
– year: 1982
  ident: ref14
  publication-title: Shift Register Sequences
– start-page: 88
  year: 1984
  ident: ref5
  article-title: The stop-and-go generator
  publication-title: Proc Advances in Cryptology-Eurocrypt'1984
– ident: ref21
  doi: 10.1023/A:1008256920596
– ident: ref24
  doi: 10.1007/978-3-540-77404-4_20
– ident: ref22
  doi: 10.1109/TIT.2007.894690
– year: 2001
  ident: ref7
  publication-title: Specification of the Bluetooth System Version 1 1
– ident: ref15
  doi: 10.1017/CBO9780511546907
– ident: ref25
  doi: 10.1007/978-3-540-77224-8_2
– volume: 5203
  start-page: 197
  year: 2008
  ident: ref16
  publication-title: Sequences and Their Applications
– volume: 3017
  start-page: 65
  year: 2004
  ident: ref2
  article-title: Improving fast algebraic attacks
  publication-title: Proc Fast Software Encryption FSE 2004
– ident: ref26
  doi: 10.1007/978-3-642-82865-2
SSID ssj0014512
Score 2.193255
Snippet In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Rønjom-Helleseth attack and the...
In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Ronjom-Helleseth attack and the...
In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Roenjom-Helleseth attack and the...
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 5555
SubjectTerms Algebra
Applied sciences
Boolean functions
Complexity theory
Cryptography
Discrete Fourier transform (DFT)
Discrete Fourier transforms
Exact sciences and technology
fast algebraic attack
filter generator
Flexibility
Fourier analysis
Fourier transforms
Generators
Information theory
Information, signal and communications theory
linear feedback shift register (LFSR)
Mathematical model
Polynomials
Signal and communications theory
Spectra
spectral immunity
Streams
Telecommunications and information theory
Title Fast Discrete Fourier Spectra Attacks on Stream Ciphers
URI https://ieeexplore.ieee.org/document/5961824
https://www.proquest.com/docview/886094503
https://www.proquest.com/docview/907937163
Volume 57
WOSCitedRecordID wos000295738500045&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared)
  customDbUrl:
  eissn: 1557-9654
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014512
  issn: 0018-9448
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dSxwxEB_06EN9UKuWnqeSh74IrrfZZPPxKLZHC0X6cAXflnwtHNg9ud3r329mv7Aogm8LSdgwk8nMZJLfD-CrjjpW0rOEGR8SbqlPDNMiwUMGakJunG1BXH_Juzt1f69_78DV-BYmhNBePgvX-NnW8v3abfGobJ4jPUnGd2FXStG91RorBjynHTI4jQYcc46hJJnq-fLnssPqjO5NcQSAfOaCWk4VvBFp6iiUsmOzeLExt95mcfC-eR7Cfh9VkptuGXyCnVAdwcHA2EB6Az6CvWfwg8cgF6ZuyLdV3Dli6EwWHX0dQUr6ZmPITdPgA3yyrgjWrs1fcrtCEIL6BP4svi9vfyQ9kULiYnzVJMqXNlNWMEEtE9LEKMl75oSztsyiEiWlpVOWWSu8SXVmqHNpyLTnIgtCl-wzTKp1Fb4Aid0t-jBu0pKrwDVekqWl5q70XvJ8CvNBtoXrUcaR7OKhaLONVBdRGwVqo-i1MYXLccRjh7DxRt9jlPbYrxf0FC7-U9_YnmG2KGWc1WzQZ9HbaF0oJWJum6dsCmRsjcaFFRNThfW2LnQLHxhD1tPXfzyDj8MZc0rPYNJstuEcPrh_zareXLQL9Amn8uJg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3daxQxEB9qK6gPVlulZ23Ngy-FrrfZZLPJY6k9WnoePpzQt5CvhYN2T273-veb2S8qiuDbQhI2zGQyM5nk9wP4rKKOZeFZwowPCbfUJ4YpkeAhAzUhN862IK7zYrGQd3fq-w6cj29hQgjt5bPwBT_bWr5fuy0elU1zpCfJ-DPYyznP0u611lgz4DntsMFpNOGYdQxFyVRNlzfLDq0zOjjJEQLyiRNqWVXwTqSpo1jKjs_ij6259Tez_f-b6Rt43ceV5KJbCG9hJ1QHsD9wNpDehA_g1RMAwkMoZqZuyNdV3Dti8ExmHYEdQVL6ZmPIRdPgE3yyrghWr80DuVwhDEH9Dn7MrpaX10lPpZC4GGE1ifSlzaQVTFDLRGFinOQ9c8JZW2ZRjQWlpZOWWSu8SVVmqHNpyJTnIgtClew97FbrKhwBid0tejFu0pLLwBVek6Wl4q70vuD5BKaDbLXrccaR7uJet_lGqnTUhkZt6F4bEzgbR_zsMDb-0fcQpT326wU9gdPf1De2Z5gvFkWc1fGgT91baa2lFDG7zVM2ATK2RvPCmompwnpba9UCCMag9cPff_wJXlwvv831_GZxewwvhxPnlH6E3WazDSfw3D02q3pz2i7WX5P55ac
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast+Discrete+Fourier+Spectra+Attacks+on+Stream+Ciphers&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Gong%2C+G&rft.au=Ronjom%2C+S&rft.au=Helleseth%2C+T&rft.au=Hu%2C+H&rft.date=2011-08-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=57&rft.issue=8&rft.spage=5555&rft_id=info:doi/10.1109%2FTIT.2011.2158480&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2439295981
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon