-
2
-
-
0021522644
-
How to generate crvptographically strong sequences of pseudorandom bits
-
M. Blum and S. Micali: How to generate crvptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13, 850-864 (1984).
-
(1984)
SIAM Journal on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
3
-
-
38249008578
-
On the covering radius of Reed-Muller codes
-
G. Cohen and S. Litsyn: On the covering radius of Reed-Muller codes. Discrete Mathematics 106-107, 147-155 (1992).
-
(1992)
Discrete Mathematics
, vol.106-107
, pp. 147-155
-
-
Cohen, G.1
Litsyn, S.2
-
4
-
-
0025434562
-
On the linear span of binary sequences from finite geometries, q odd
-
A.H. Chan and R.A. Games: On the linear span of binary sequences from finite geometries,q odd. IEEE Transactions on Information Theory 36, 548-552 (1990).
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, pp. 548-552
-
-
Chan, A.H.1
Games, R.A.2
-
5
-
-
85013094137
-
The differential cryptanalysis and design of natural stream ciphers
-
R. Anderson (ed.): Lecture Notes in Computer Science 809. Berlin: Springer
-
C. Ding: The differential cryptanalysis and design of natural stream ciphers. In: R. Anderson (ed.): Fast Software Encryption: Proceedings of 1993 Cambridge Security Workshop. Lecture Notes in Computer Science 809. Berlin: Springer 1994, pp. 101-120.
-
(1994)
Fast Software Encryption: Proceedings of 1993 Cambridge Security Workshop
, pp. 101-120
-
-
Ding, C.1
-
6
-
-
84948958360
-
Linear cryptanalyis of stream ciphers
-
B. Preneel (ed.): Lecture Notes in Computer Science 1008. Berlin: Springer
-
J. Golić: Linear cryptanalyis of stream ciphers. In: B. Preneel (ed.): Fast Software Encryption: Proceedings of 1994 Leuven Security Workshop. Lecture Notes in Computer Science 1008. Berlin: Springer 1995, pp. 154-169.
-
(1995)
Fast Software Encryption: Proceedings of 1994 Leuven Security Workshop
, pp. 154-169
-
-
Golić, J.1
-
7
-
-
0015064669
-
Generation of binary sequences with controllable complexity
-
E.J. Groth: Generation of binary sequences with controllable complexity. IEEE Transactions on Information Theory IT-17, 288-296 (1971).
-
(1971)
IEEE Transactions on Information Theory
, vol.IT-17
, pp. 288-296
-
-
Groth, E.J.1
-
8
-
-
0017017134
-
An Analysis of the structure and complexity of nonlinear binary sequence generators
-
E.L. Key: An Analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory IT-22, 732-736 (1976).
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, pp. 732-736
-
-
Key, E.L.1
-
9
-
-
0028675685
-
The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic
-
A. Klapper: The Vulnerability of Geometric Sequences Based on Fields of Odd Characteristic. Journal of Cryptology 7, 33-51 (1994).
-
(1994)
Journal of Cryptology
, vol.7
, pp. 33-51
-
-
Klapper, A.1
-
11
-
-
4243159242
-
-
University of Kentucky, Deptartment of Computer Science Technical Report
-
A. Klapper and M. Goresky: Feedback Shift Registers, Combiners with Memory, and 2-Adic Span, University of Kentucky, Deptartment of Computer Science Technical Report, 1995.
-
(1995)
Feedback Shift Registers, Combiners with Memory, and 2-Adic Span
-
-
Klapper, A.1
Goresky, M.2
-
12
-
-
84957665414
-
Cryptanalysis Based on 2-Adic Rational Approximation
-
D. Coppersmith (ed.) Lecture Notes in Computer Science 963. Berlin: Springer
-
A. Klapper and M. Goresky: Cryptanalysis Based on 2-Adic Rational Approximation. In: D. Coppersmith (ed.) Advances in Cryptology - CRYPTO'95. Lecture Notes in Computer Science 963. Berlin: Springer 1994, pp. 262-273.
-
(1994)
Advances in Cryptology - CRYPTO'95
, pp. 262-273
-
-
Klapper, A.1
Goresky, M.2
-
14
-
-
85043762670
-
A Provably-Secure Strongly-Randomized Cipher
-
S. Vanstone (ed.) Lecture Notes in Computer Science 473. Berlin: Springer
-
U. M. Maurer: A Provably-Secure Strongly-Randomized Cipher. In: S. Vanstone (ed.) Advances in Cryptology - CRYPTO'90. Lecture Notes in Computer Science 473. Berlin: Springer 1991, pp. 361-73.
-
(1991)
Advances in Cryptology - CRYPTO'90
, pp. 361-373
-
-
Maurer, U.M.1
-
17
-
-
0021786321
-
Decrypting a class of stream ciphers using cipertext only
-
T. Siegenthaler: Decrypting a class of stream ciphers using cipertext only. IEEE Transactions on Computing 34, 81-85 (1985).
-
(1985)
IEEE Transactions on Computing
, vol.34
, pp. 81-85
-
-
Siegenthaler, T.1
|