-
2
-
-
49049100555
-
-
Wedbush Morgan Securities - Industrial Report, Access Management/Internet Security Industry, on http://www.vikasqupta.com, Feb. 28, 2002.
-
Wedbush Morgan Securities - Industrial Report, "Access Management/Internet Security Industry," on http://www.vikasqupta.com, Feb. 28, 2002.
-
-
-
-
5
-
-
33847538049
-
Cryptanalysis of Summation Generator
-
Advances in Cryptology, AUSCRYPT'92, Springer-Verlag, pp
-
E. Dawson, "Cryptanalysis of Summation Generator," Advances in Cryptology - AUSCRYPT'92, Lecture Notes in Computer Science, Springer-Verlag, pp. 209-215, 1993.
-
(1993)
Lecture Notes in Computer Science
, pp. 209-215
-
-
Dawson, E.1
-
6
-
-
0001120657
-
Fast Correlation Attacks on the Summation Generator
-
J. Golic, and M. Salmasizadeh and E. Dawson, Fast Correlation Attacks on the Summation Generator," Journal of Cryptology, Vol. 13, No. 2, pp.245-262, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 245-262
-
-
Golic, J.1
Salmasizadeh, M.2
Dawson, E.3
-
7
-
-
0343167987
-
On An Improved Summation Generator with 2-Bit Memory
-
Jan
-
Hoonjae Lee, Sangjae Moon, "On An Improved Summation Generator with 2-Bit Memory," Signal Processing, 80(1), pp. 211217, Jan. 2000.
-
(2000)
Signal Processing
, vol.80
, Issue.1
, pp. 211217
-
-
Lee, H.1
Moon, S.2
-
10
-
-
0026678847
-
Correlation Properties of Combiners with Memory in Stream Ciphers
-
W. Meier and O. Staffelbach, "Correlation Properties of Combiners with Memory in Stream Ciphers," Journal of Cryptology, Vol. 5, pp. 67-86, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, pp. 67-86
-
-
Meier, W.1
Staffelbach, O.2
-
11
-
-
84947439509
-
The LILI-II Keystream Generator
-
Jul, ACISP
-
A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W. Millan, Sang-Jae Moon, L. Simpson, "The LILI-II Keystream Generator," LNCS 2384, pp.25-39, Jul. 2002 (ACISP'2002).
-
(2002)
LNCS
, vol.2384
, pp. 25-39
-
-
Clark, A.1
Dawson, E.2
Fuller, J.3
Golic, J.4
Jae Lee, H.5
Millan, W.6
Jae Moon, S.7
Simpson, L.8
-
12
-
-
84937740421
-
Shift-Register Synthesis and BCH Decoding
-
Jan
-
J. L. Massey, "Shift-Register Synthesis and BCH Decoding," IEEE Trans. on Infor. Theo., Vol. IT-15, No. 1, pp. 122-127, Jan. 1969.
-
(1969)
IEEE Trans. on Infor. Theo
, vol.IT-15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
13
-
-
0023213033
-
Products of Linear Recurring Sequences with Maximum Complexity
-
Jan
-
R. A. Rueppel and O. J. Stafflebach, "Products of Linear Recurring Sequences with Maximum Complexity," IEEE Trans. on Infor. Theo., Vol. IT-33, No. 1, pp. 124-131, Jan. 1987.
-
(1987)
IEEE Trans. on Infor. Theo
, vol.IT-33
, Issue.1
, pp. 124-131
-
-
Rueppel, R.A.1
Stafflebach, O.J.2
-
14
-
-
49049088440
-
Security Analysis of the LM Generator
-
Aug
-
Kevin Chen, Ed.Dawson, etc. "Security Analysis of the LM Generator," Report, Aug. 2004.
-
(2004)
Report
-
-
Chen, K.1
Dawson, E.2
-
15
-
-
0029218160
-
Improved exhaustive search attacks on stream ciphers
-
May
-
S. Babbage, "Improved exhaustive search attacks on stream ciphers," European Convention on Security and Detection, Vol. 408, pp. 161-166, May 1995.
-
(1995)
European Convention on Security and Detection
, vol.408
, pp. 161-166
-
-
Babbage, S.1
-
16
-
-
84937419430
-
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
-
Advances in Cryptology, Proceedings of ASIACRYPTOO
-
A. Biryikov and A. Shamir, "Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers", Advances in Cryptology, Proceedings of ASIACRYPTOO, LNCS 1976, pp. 1-13, 2000.
-
(1976)
LNCS
, pp. 1-13
-
-
Biryikov, A.1
Shamir, A.2
|