-
3
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum M., and Micali S. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing 13 4 (1984) 850-864
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
4
-
-
0018456171
-
Universal classes of hash functions
-
Carter J.L., and Wegman M.N. Universal classes of hash functions. JCSS 18 (1979) 143-154
-
(1979)
JCSS
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
5
-
-
84974670663
-
The Shrinking Generator, Advances in Cryptology - Crypto '93
-
Springer-Verlag;
-
Coppersmith D, Krawczyk H, Mansour Y. The Shrinking Generator, Advances in Cryptology - Crypto '93, LNCS, vol. 773. Springer-Verlag; 1994. p. 22-39.
-
(1994)
LNCS
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
7
-
-
35248859228
-
Predicting the shrinking generator with fixed connections
-
EUROCRYPT 2003, Springer-Verlag
-
Ekdahl P., Meier W., and Johannson T. Predicting the shrinking generator with fixed connections. EUROCRYPT 2003. Lecture notes in computer science (1999), Springer-Verlag 330-334
-
(1999)
Lecture notes in computer science
, pp. 330-334
-
-
Ekdahl, P.1
Meier, W.2
Johannson, T.3
-
10
-
-
33748341920
-
Cryptographic hash functions and low-power techniques for embedded hardware
-
Huang A.L., and Penzhorn W.T. Cryptographic hash functions and low-power techniques for embedded hardware. IEEE Conference Proceedings 4 (2005) 1789-1794
-
(2005)
IEEE Conference Proceedings
, vol.4
, pp. 1789-1794
-
-
Huang, A.L.1
Penzhorn, W.T.2
-
13
-
-
84991939136
-
LFSR-based hashing and authentication
-
Advances in cryptology - crypto'94, Springer-Verlag
-
Krawczyk H. LFSR-based hashing and authentication. Advances in cryptology - crypto'94. Lecture notes in computer science vol. 839 (1994), Springer-Verlag 129-139
-
(1994)
Lecture notes in computer science
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
14
-
-
33745650569
-
Fast correlation attacks on stream ciphers
-
Advances in cryptology, EUROCRYPT88, Springer-Verlag
-
Meier W., and Staffelbach O. Fast correlation attacks on stream ciphers. Advances in cryptology, EUROCRYPT88. Lecture notes in computer science vol. 330 (1988), Springer-Verlag 301-314
-
(1988)
Lecture notes in computer science
, vol.330
, pp. 301-314
-
-
Meier, W.1
Staffelbach, O.2
-
16
-
-
35048823393
-
Improved linear consistency attack on irregular clocked keystream generators
-
Fast software encryption-FSE'2004, Springer-Verlag
-
Molland H. Improved linear consistency attack on irregular clocked keystream generators. Fast software encryption-FSE'2004. LNCS vol. 3017 (2004), Springer-Verlag 109-126
-
(2004)
LNCS
, vol.3017
, pp. 109-126
-
-
Molland, H.1
-
17
-
-
63049112837
-
-
A statistical suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, May 15; 2001.
-
A statistical suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, May 15; 2001.
-
-
-
-
20
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Shamir A. On the generation of cryptographically strong pseudorandom sequences. ACM Transaction on Computer Systems 1 1 (1983) 38-44
-
(1983)
ACM Transaction on Computer Systems
, vol.1
, Issue.1
, pp. 38-44
-
-
Shamir, A.1
-
23
-
-
38949103410
-
Research on a novel hashing stream cipher
-
Zhang Y., Niu X., Li J., and Li C. Research on a novel hashing stream cipher. IEEE Conference Proceedings 2 3-6 (2006) 1339-1344
-
(2006)
IEEE Conference Proceedings
, vol.2
, Issue.3-6
, pp. 1339-1344
-
-
Zhang, Y.1
Niu, X.2
Li, J.3
Li, C.4
|