-
1
-
-
51249173801
-
On Lov́asz' lattice reduction and the nearest lattice point problem
-
L. Babai, "On Lov́asz' lattice reduction and the nearest lattice point problem," Combinatorica, vol. 6, no. 1, pp. 1-13, 1986.
-
(1986)
Combinatorica
, vol.6
, Issue.1
, pp. 1-13
-
-
Babai, L.1
-
2
-
-
84958656559
-
Pseudo-random number generation within cryptographic algorithms: The DSS case
-
M. Bellare, S. Goldwasser, and D. Macciancio, "Pseudo-random number generation within cryptographic algorithms: The DSS case," Proceedings of Advances in Cryptography (Crypto'97), pp. 277-291, 1997.
-
(1997)
Proceedings of Advances in Cryptography(Crypto'97)
, pp. 277-291
-
-
Bellare, M.1
Goldwasser, S.2
Macciancio, D.3
-
3
-
-
0024303956
-
Inferring sequences produced by pseudo random number generators
-
J. Boyar, "Inferring sequences produced by pseudo random number generators," Journal of the ACM, vol. 36, no. 1, pp. 129-141, 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.1
, pp. 129-141
-
-
Boyar, J.1
-
4
-
-
84875361430
-
Evaluating the performance of symmetric encryption algorithms
-
D. S. A. Elminaam, H. M. A. Kader, and M. M. Hadhoud, "Evaluating the performance of symmetric encryption algorithms," International Journal of Network Security, Vol. 10, No. 3, 2010, pp. 213-219
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 213-219
-
-
Elminaam, D.S.A.1
Kader, H.M.A.2
Hadhoud, M.M.3
-
7
-
-
84875316800
-
-
Technical report, HP Labs, HPL-1999-90, Aug
-
N. A. Howgrave-Graham and N. P. Smart, Lattice Attacks on Digital Signature Schemes, Technical report, HP Labs, HPL-1999-90, Aug. 1999.
-
(1999)
Lattice Attacks on Digital Signature Schemes
-
-
Howgrave-Graham, N.A.1
Smart, N.P.2
-
8
-
-
84874809312
-
A genetic algorithm for cryptanalysis of DES-8
-
H. M. H. Huseim, B. I. Bayoumi, F. S. Holail, B. E. M. Hasan, and M. Z. A. El-Mageed, "A genetic algorithm for cryptanalysis of DES-8," International Journal of Network Security, vol. 5, no. 2, pp. 213-219, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.2
, pp. 213-219
-
-
Huseim, H.M.H.1
Bayoumi, B.I.2
Holail, F.S.3
Hasan, B.E.M.4
El-Mageed, M.Z.A.5
-
9
-
-
77955740925
-
A genetic algorithm for cryptanalysis with application to DES-like systems
-
H. M. H. Huseim, B. I. Bayoumi, F. S. Holail, B. E. M. Hasan, and M. Z. A. El-Mageed, "A genetic algorithm for cryptanalysis with application to DES-like systems," International Journal of Network Security, vol. 8, no. 2, pp. 177-186, 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 177-186
-
-
Huseim, H.M.H.1
Bayoumi, B.I.2
Holail, F.S.3
Hasan, B.E.M.4
El-Mageed, M.Z.A.5
-
10
-
-
31644449755
-
Research issues and challenges for multiple digital signatures
-
M. S. Hwang and C. C. Lee, "Research issues and challenges for multiple digital signatures," International Journal of Network Security, vol. 1, no. 1, pp. 1-7, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.1
, pp. 1-7
-
-
Hwang, M.S.1
Lee, C.C.2
-
11
-
-
0001134554
-
Lattice reduction: A toolbox for the cryptanalyst
-
A. Joux and J. Stern, "Lattice reduction: A toolbox for the cryptanalyst," Journal of Cryptology, vol. 11, no. 3, pp.161-185, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.3
, pp. 161-185
-
-
Joux, A.1
Stern, J.2
-
14
-
-
0006890305
-
Seminumerical Algorithms
-
Addison-Wesley, Reading, Mass
-
D. E. Knuth, Seminumerical Algorithms, The Art of Computer Programming (Vol. 2), Addison-Wesley, Reading, Mass., 1969.
-
(1969)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
15
-
-
0021819410
-
Deciphering a linear congruential encryption
-
D. E. Knuth, "Deciphering a linear congruential encryption," IEEE Transactions on Information Theory, vol. 83, no. 11, pp. 49-52, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.83
, Issue.11
, pp. 49-52
-
-
Knuth, D.E.1
-
16
-
-
84875360956
-
National Institute of Standards and Technology (NIST)
-
May 19
-
National Institute of Standards and Technology (NIST), FIPS Publication 186: Digital Signature Standard, May 19, 1994.
-
(1994)
FIPS Publication Digital Signature Standard
, vol.186
-
-
-
17
-
-
33846870481
-
Lattice reduction in cryptology: An update
-
Lecture Notes in Computer Science, Springer-Verlag
-
P. Q. Nguyen and J. Stern, "Lattice reduction in cryptology: An update," Proceedings of 4'th International Symposium on Algorithms in Number Theory (ANTS-IV), Lecture Notes in Computer Science, Springer-Verlag, pp. 85-112, 2000.
-
(2000)
Proceedings of 4'th International Symposium on Algorithms in Number Theory, ANTS-IV
, pp. 85-112
-
-
Nguyen, P.Q.1
Stern, J.2
-
18
-
-
79955634683
-
Random bit generator using chaotic maps
-
N. K. A Pareek, V. Patidar, and K. K. Sud, "Random bit generator using chaotic maps," International Journal of Network Security, vol. 10, no. 1, pp. 32-38, 2010.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.1
, pp. 32-38
-
-
Pareek, N.K.A.1
Patidar, V.2
Sud, K.K.3
-
19
-
-
84974731225
-
Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography
-
L. Shunjun, M. Xuanqin, and C. Yuanlong, "Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography," Proceedings of the Second International Conference on Cryptology in India, pp. 316-329, 2001.
-
(2001)
Proceedings of the Second International Conference on Cryptology in India
, pp. 316-329
-
-
Shunjun, L.1
Xuanqin, M.2
Yuanlong, C.3
-
20
-
-
84892526019
-
Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding
-
Dec
-
S. Li, Q. Li, W. Li, X. Mou, and Y. Cai, "Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding," Proceedings of the 8th IMA International Conference, pp. 205-221, Dec. 2001.
-
(2001)
Proceedings of the 8th IMA International Conference
, pp. 205-221
-
-
Li, S.1
Li, Q.2
Li, W.3
Mou, X.4
Cai, Y.5
-
21
-
-
0003987443
-
Cryptography: Theory and Practice
-
Chapman & Hall, 3rd edition
-
D. Stinson, Cryptography: Theory and Practice, Chapman & Hall, 3rd edition, 2006.
-
(2006)
-
-
Stinson, D.1
-
22
-
-
84968520264
-
Random numbers generated by linear recurrence modulo two
-
R. C. Tausworthe, "Random numbers generated by linear recurrence modulo two," Mathematics of Computation, vol. 19, no. 90, pp. 201-209, 1965.
-
(1965)
Mathematics of Computation
, vol.19
, Issue.90
, pp. 201-209
-
-
Tausworthe, R.C.1
|