-
1
-
-
84958052942
-
Break finite automata public key cryptosystem, in
-
F. Bao and Y. Igarashi, Break finite automata public key cryptosystem, in Automata, Languages and Programming, Lecture Notes in Computer Sciences,Vol. 944, Springer-Verlag, Berlin, 1995, pp. 147-158.
-
Automata, Languages and Programming, Lecture Notes in Computer Sciences,Vol. 944, Springer-Verlag, Berlin, 1995, Pp. 147-158.
-
-
Bao, F.1
Igarashi, Y.2
-
3
-
-
33745985177
-
-
X.M. Chen, The Invertibility Theory and Application of Quadratic Finite Automata, Doctoral thesis, Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing100080, November 1996.
-
The Invertibility Theory and Application of Quadratic Finite Automata, Doctoral Thesis, Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing100080, November 1996.
-
-
Chen, X.M.1
-
5
-
-
33746001644
-
Weak invertibility of linear finite automata over commutative rings - Classification and enumeration
-
Z.D. Dai and D.F. Ye, Weak invertibility of linear finite automata over commutative rings - classification and enumeration, Kexue Tongbao (Bulletin of Science),Vol. 4, No. 15 (1995), pp. 1357-1360 (in Chinese).
-
Kexue Tongbao (Bulletin of Science),Vol. 4, No. 15 (1995), Pp. 1357-1360 (In Chinese).
-
-
Dai, Z.D.1
Ye, D.F.2
-
6
-
-
1542788396
-
Weak invertibility of linear finite automata I-classification and enumeration of transfer functions
-
Z.D. Dai and D.F. Ye, Weak invertibility of linear finite automata I-classification and enumeration of transfer functions, Sci. China (Ser. A),Vol. 39, No. 6 (1996), pp. 613-623.
-
Sci. China (Ser. A),Vol. 39, No. 6 (1996), Pp. 613-623.
-
-
Dai, Z.D.1
Ye, D.F.2
-
7
-
-
84947768786
-
Weak invertibility of finite automata and Cryptanalysis of FAPKC
-
Z. Dai, D. Ye and K. Lam, Weak invertibility of finite automata and Cryptanalysis of FAPKC, Proceedings ofASIACRYPT '98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, Berlin, 1998.
-
Proceedings OfASIACRYPT '98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, Berlin, 1998.
-
-
Dai D Ye, Z.1
Lam, K.2
-
8
-
-
33745986706
-
-
M. Dickerson, The Functional Decomposition of Polynomials, Ph.D Thesis, TR89-1023, Deptartment of Computer Science, Cornell University, Ithaca, NY, July 1989.
-
The Functional Decomposition of Polynomials, Ph.D Thesis, TR89-1023, Deptartment of Computer Science, Cornell University, Ithaca, NY, July 1989
-
-
Dickerson, M.1
-
9
-
-
0017018484
-
New directions in cryptograghy
-
W. Diffie and M.E. Hellman, New directions in cryptograghy, IEEE Trans. Inform. Theory, Vol. IT-22, No. 6 (1976), pp. 644-654.
-
IEEE Trans. Inform. Theory, Vol. IT-22, No. 6 (1976), Pp. 644-654.
-
-
Diffie, W.1
Hellman, M.E.2
-
11
-
-
0342430954
-
Trapdoor one-way permutations and multivariate polynomials
-
J. Patarin and L. Goubin, Trapdoor one-way permutations and multivariate polynomials, Proceedings of ICICS '97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag, Berlin, 1997.
-
Proceedings of ICICS '97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag, Berlin, 1997.
-
-
Patarin, J.1
Goubin, L.2
-
12
-
-
0010537086
-
Asymmetric cryptography with S-boxes
-
J. Patarin and L. Goubin, Asymmetric cryptography with S-boxes, Proceedings of ICICS '97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag, 1997.
-
Proceedings of ICICS '97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag, 1997.
-
-
Patarin, J.1
Goubin, L.2
-
13
-
-
33745987631
-
C_+ and HM: Variations around two schemes of T. Matsumoto and H. Imai
-
J. Patarin, L. Goubin and N. Courtois, C_+ and HM: variations around two schemes of T. Matsumoto and H. Imai, Advances in Cryptology, Proceedings ofASIACRYPT '98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, Berlin, 1998.
-
Advances in Cryptology, Proceedings OfASIACRYPT '98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, Berlin, 1998.
-
-
Patarin, J.1
Goubin, L.2
Courtois, N.3
-
14
-
-
33746009628
-
Cryptanalysis of finite automaton public key cryptosystems
-
Z.P. Qin and H.G. Zhang, Cryptanalysis of finite automaton public key cryptosystems, Proceedings of Chinacrypt '96, Science Press, Beijing, pp. 75-86. (in Chinese).
-
Proceedings of Chinacrypt '96, Science Press, Beijing, Pp. 75-86. (In Chinese).
-
-
Qin, Z.P.1
Zhang, H.G.2
-
15
-
-
33745972656
-
On finite automaton one-key cryptosystem, in
-
R.J. Tao, On finite automaton one-key cryptosystem, in Fast Sofnvare Encryption, Lecture Notes in Computer Science,Vol. 809, Springer-Verlag, Berlin, 1993.
-
Fast Sofnvare Encryption, Lecture Notes in Computer Science,Vol. 809, Springer-Verlag, Berlin, 1993.
-
-
Tao, R.J.1
-
18
-
-
33745990523
-
Cryptanalysis of 2R schemes
-
D.F. Ye, Z.D. Dai and K.Y. Lam, Cryptanalysis of 2R schemes, Proceedings ofCRYPTO '99, Springer-Verlag, New York.
-
Proceedings OfCRYPTO '99, Springer-Verlag, New York.
-
-
Ye, D.F.1
Dai, Z.D.2
Lam, K.Y.3
|