-
1
-
-
46149128523
-
Random sequence generation by cellular automata
-
S. Wolfram, “Random sequence generation by cellular automata”, Advances in Applied Mathematics 7, pp. 123-169, 1986.
-
(1986)
Advances in Applied Mathematics
, vol.7
, pp. 123-169
-
-
Wolfram, S.1
-
2
-
-
84992720189
-
Cryptography with cellular automata
-
S. Wolfram, “Cryptography with cellular automata”, Lecture Notes in Computer Science, vol. 218, pp. 429-432, 1986.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 429-432
-
-
Wolfram, S.1
-
3
-
-
85013632897
-
Analysis of pseudo random sequences generated by cellular automata
-
W. Meier and O. Staffelbach, “Analysis of pseudo random sequences generated by cellular automata”, Lecture Notes in Computer Science, vol. 547, pp. 186-199, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.547
, pp. 186-199
-
-
Meier, W.1
Staffelbach, O.2
-
4
-
-
0024012004
-
The first ten years of public-key cryptography
-
W. Diffie, “The first ten years of public-key cryptography”, Proc. IEEE, pp. 560-577, 1988.
-
(1988)
Proc. IEEE
, pp. 560-577
-
-
Diffie, W.1
-
5
-
-
0025211461
-
Efficient characterization of cellular automata
-
Jan
-
A.K. Das, A. Gonguly, A. Dasgupta, S. Bhawmik, and P. Pal Chaudhuri, ‘‘Efficient characterization of cellular automata”, IEE Proc., Pt. E, vol. 137, no. 1, pp. 81-87, Jan. 1990.
-
(1990)
IEE Proc., Pt. E
, vol.137
, Issue.1
, pp. 81-87
-
-
Das, A.K.1
Gonguly, A.2
Dasgupta, A.3
Bhawmik, S.4
Pal Chaudhuri, P.5
-
6
-
-
0027555036
-
Vector space theoretic analysis of additive cellular automata and its applications for pseudo-exhaustive test pattern generation
-
A.K. Das and P. Pal Chaudhuri, “Vector space theoretic analysis of additive cellular automata and its applications for pseudo-exhaustive test pattern generation”, IEEE Trans. Comput., vol. 42, no. 3 pp. 340-352, Mar. 1993.
-
(1993)
IEEE Trans. Comput
, vol.42
, Issue.3
, pp. 340-352
-
-
Das, A.K.1
Pal Chaudhuri, P.2
-
7
-
-
0028750092
-
Theory and applications of cellular automata in cryptography
-
Dec
-
S. Nandi, B.K. Kar, and P. Pal Chaudhuri, “Theory and applications of cellular automata in cryptography”, IEEE Trans. Comput., vol. 43, no. 12, pp. 1346-1357, Dec. 1994.
-
(1994)
IEEE Trans. Comput
, vol.43
, Issue.12
, pp. 1346-1357
-
-
Nandi, S.1
Kar, B.K.2
Pal Chaudhuri, P.3
-
8
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
Jan
-
T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only”, IEEE Trans. Comput, vol. C-34, no. 1, pp. 81-85, Jan. 1985.
-
(1985)
IEEE Trans. Comput
, vol.C-34
, Issue.1
, pp. 81-85
-
-
Siegenthaler, T.1
-
9
-
-
84873998819
-
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function, Advances in Cryptology – ASIACRYPT ‘94
-
M. Mihaljević, “A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function”, Advances in Cryptology – ASIACRYPT ‘94, Lecture Notes in Computer Science, vol. 917, pp. 67-79, 1995.
-
(1995)
Advances in Cryptology – ASIACRYPT ‘94, Lecture Notes in Computer Science
, vol.917
, pp. 67-79
-
-
Mihaljević, M.1
-
10
-
-
0025824847
-
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
-
J. Golić and M. Mihaljević, “ A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance”, Journal of Cryptology, vol. 3, pp. 201-212, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, pp. 201-212
-
-
Golić, J.1
Mihaljević, M.2
-
11
-
-
85032480688
-
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence, Advances in Cryptology – AUSCRYPT ‘90
-
M. Mihaljević and J. Golić, “A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence”, Advances in Cryptology – AUSCRYPT ‘90, Lecture Notes in Computer Science, vol. 453, pp. 165-175, 1990.
-
(1990)
Advances in Cryptology – AUSCRYPT ‘90, Lecture Notes in Computer Science
, vol.453
, pp. 165-175
-
-
Mihaljević, M.1
Golić, J.2
-
12
-
-
84974658205
-
A comparison of cryptanalytic principles based on iterative error-correction, Advances in Cryptology – EUROCRYPT ‘91
-
M. Mihaljević and J. Golić, “A comparison of cryptanalytic principles based on iterative error-correction”, Advances in Cryptology – EUROCRYPT ‘91, Lecture Notes in Computer Science, vol. 547, pp. 527-531, 1992.
-
(1992)
Advances in Cryptology – EUROCRYPT ‘91, Lecture Notes in Computer Science
, vol.547
, pp. 527-531
-
-
Mihaljević, M.1
Golić, J.2
-
13
-
-
33745992035
-
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence, Advances in Cryptology – EUROCRYPT ‘92
-
M. Mihaljević and J. Golić, “Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence”, Advances in Cryptology – EUROCRYPT ‘92, Lecture Notes in Computer Science, vol. 658, pp. 124-137, 1993.
-
(1993)
Advances in Cryptology – EUROCRYPT ‘92, Lecture Notes in Computer Science
, vol.658
, pp. 124-137
-
-
Mihaljević, M.1
Golić, J.2
|