메뉴 건너뛰기




Volumn 2229, Issue , 2001, Pages 23-34

Primitive polynomials over gf(2) - A cryptologic approach

Author keywords

Cyclotomic cosets; Galois field; Primitive polynomials; Stream cipher

Indexed keywords

SHIFT REGISTERS;

EID: 33645202082     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45600-7_3     Document Type: Conference Paper
Times cited : (9)

References (16)
  • 3
    • 0025465287 scopus 로고
    • Some comments on Zech’s logarithms
    • July
    • K. Huber. Some comments on Zech’s logarithms. IEEE Transactions on Information Theory, IT-36(4): 946-950, July 1990.
    • (1990) IEEE Transactions on Information Theory , vol.IT-36 , Issue.4 , pp. 946-950
    • Huber, K.1
  • 5
    • 33645191994 scopus 로고    scopus 로고
    • On choice of connection polynomials for LFSR based stream ciphers
    • number 1977 in Lecture Notes in Computer Science, Springer Verlag
    • K. Jambunathan. On choice of connection polynomials for LFSR based stream ciphers. In Progress in Cryptology - INDOCRYPT 2000, number 1977 in Lecture Notes in Computer Science, pages 9-18. Springer Verlag, 2000.
    • (2000) Progress in Cryptology - INDOCRYPT 2000 , pp. 9-18
    • Jambunathan, K.1
  • 7
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • number 1880 in Lecture Notes in Computer Science, Springer Verlag
    • T. Johansson and F. Jonsson. Fast correlation attacks through reconstruction of linear polynomials. In Advances in Cryptology - CRYPTO 2000, number 1880 in Lecture Notes in Computer Science, pages 300-315. Springer Verlag, 2000.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 300-315
    • Johansson, T.1    Jonsson, F.2
  • 8
    • 0004060515 scopus 로고
    • Addison Wesley Publishing Company, Inc
    • W. J. Leveque. Topics in Number Theory, volume 1. Addison Wesley Publishing Company, Inc, 1955.
    • (1955) Topics in Number Theory , vol.1
    • Leveque, W.J.1
  • 11
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Stafflebach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1: 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Stafflebach, O.2
  • 13
    • 84969396978 scopus 로고    scopus 로고
    • Nonlinearity bounds and constructions of resilient boolean functions
    • number 1880 in Lecture Notes in Computer Science, Springer Verlag
    • P. Sarkar and S. Maitra. Nonlinearity bounds and constructions of resilient boolean functions. In Advances in Cryptology - CRYPTO 2000, number 1880 in Lecture Notes in Computer Science, pages 515-532. Springer Verlag, 2000.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 515-532
    • Sarkar, P.1    Maitra, S.2
  • 14
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • September
    • T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30(5): 776- 780, September 1984.
    • (1984) IEEE Transactions on Information Theory , vol.IT-30 , Issue.5 , pp. 776-780
    • Siegenthaler, T.1
  • 15
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • January
    • T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computers, C-34(1): 81-85, January 1985.
    • (1985) IEEE Transactions on Computers , vol.C-34 , Issue.1 , pp. 81-85
    • Siegenthaler, T.1
  • 16
    • 84957030604 scopus 로고    scopus 로고
    • http://www.theory.csc.uvic.ca/~cos/inf/neck/denprim.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.