-
4
-
-
85023839979
-
-
CMSC-693 Project, Computer Science Department, University of Maryland Baltimore County
-
Cain, Thomas R. 1993. How to break Gifford’s Cipher. CMSC-693 Project, Computer Science Department, University of Maryland Baltimore County. 57.
-
(1993)
How to Break Gifford’s Cipher
, pp. 57
-
-
Cain, T.R.1
-
5
-
-
85023839979
-
-
Technical Report TR CS-94-7, Computer Science Department, University of Maryland Baltimore County
-
Cain, Thomas, and Alan T. Sherman. 1994. How to break Gifford’s Cipher. Technical Report TR CS-94-7, Computer Science Department, University of Maryland Baltimore County. 49.
-
(1994)
How to Break Gifford’s Cipher
, pp. 49
-
-
Cain, T.1
Sherman, A.T.2
-
6
-
-
85023857074
-
-
Second Annual ACM Conference on Computer and Communications Security. New York: ACM Press
-
Cain, Thomas, and Alan T. Sherman. 1994. How to break Gifford’s Cipher (extended abstract). In Second Annual ACM Conference on Computer and Communications Security. New York: ACM Press, 198-209.
-
(1994)
How to Break Gifford’s Cipher (Extended Abstract)
, pp. 198-209
-
-
Cain, T.1
Sherman, A.T.2
-
7
-
-
0003402835
-
First Leaves
-
V. New York: Springer-Verlag
-
Char, Bruce W., K. Geddes, G. Gonnet, B. Leong, M. Monagan, and S. Watt. 1992. First Leaves: A Tutorial Introduction to Maple V. New York: Springer-Verlag.
-
(1992)
A Tutorial Introduction to Maple
-
-
Char, B.W.1
Geddes, K.2
Gonnet, G.3
Leong, B.4
Monagan, M.5
Watt, S.6
-
8
-
-
85030473541
-
On a fast correlation attack on certain stream ciphers
-
91. New York: Springer-Verlag
-
Chepyzhov, Vladimir, and Ben Smeets. 1991. On a fast correlation attack on certain stream ciphers. In Advances in Cryptology: Eurocrypt 91. New York: Springer-Verlag. 176-185.
-
(1991)
Advances in Cryptology: Eurocrypt
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
12
-
-
0011043342
-
Divide and conquer attacks on certain classes of stream ciphers
-
Dawson, Ed, and Andrew Clark, 1994. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia. 18(1): 25-40.
-
(1994)
Cryptologia
, vol.18
, Issue.1
, pp. 25-40
-
-
Dawson, E.1
Clark, A.2
-
13
-
-
0041033593
-
A fast correlation attack on nonlinearly feedforward filtered shift-register sequences
-
89. New York: Springer-Verlag
-
Forre, Rejane. 1989. A fast correlation attack on nonlinearly feedforward filtered shift-register sequences. In Advances in Cryptology: Eurocrypt ’89. New York: Springer-Verlag. 586-595.
-
Advances in Cryptology: Eurocrypt
, pp. 586-595
-
-
Forre, R.1
-
14
-
-
0000953388
-
Statistical techniques for language recognition: An introduction and guide for cryptanalysts
-
Ganesan, Ravi, and Alan T. Sherman. 1993. Statistical techniques for language recognition: An introduction and guide for cryptanalysts. Cryptologia. 17(4): 321-366.
-
(1993)
Cryptologia
, vol.17
, Issue.4
, pp. 321-366
-
-
Ganesan, R.1
Sherman, A.T.2
-
15
-
-
0001298193
-
Statistical techniques for language recognition: An empirical study using real and simulated English
-
Ganesan, Ravi, and Alan T. Sherman. 1994. Statistical techniques for language recognition: An empirical study using real and simulated English. Cryp-tologia. 18(4): 289-331.
-
(1994)
Cryp-Tologia
, vol.18
, Issue.4
, pp. 289-331
-
-
Ganesan, R.1
Sherman, A.T.2
-
16
-
-
0003603813
-
-
A Guide to the Theory of NP-Completeness. San Francisco: W. H. Freeman
-
Gary, Michael R., and David S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. San Francisco: W. H. Freeman.
-
(1979)
Computers and Intractability
-
-
Gary, M.R.1
Johnson, D.S.2
-
17
-
-
85023881827
-
-
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science. New York: ACM Press
-
Giesbrecht, Mark. 1992. Fast algorithms for matrix normal forms. In Proceedings of the 33rd Annual Symposium on Foundations of Computer Science. New York: ACM Press. 121-130.
-
(1992)
Fast Algorithms for Matrix Normal Forms
, pp. 121-130
-
-
Giesbrecht, M.1
-
18
-
-
18444377333
-
-
Technical Report MIT/LCS/TR-397, MIT Laboratory for Computer Science
-
Gifford, David K., Dawn Heitmann, David A. Segal, Robert G. Cote, Kendra Tanacea, and David E. Burmaster. 1987. Boston Community Information System 1986 experimental test results, Technical Report MIT/LCS/TR-397, MIT Laboratory for Computer Science.
-
(1987)
Boston Community Information System 1986 Experimental Test Results
-
-
Gifford, D.K.1
Heitmann, D.2
Segal, D.A.3
Cote, R.G.4
Tanacea, K.5
Burmaster, D.E.6
-
19
-
-
0022062271
-
The application of digital broadcast communication to large scale information systems
-
Gilford, David K., John M. Lucassen, and Stephen T. Berlin. 1985. The application of digital broadcast communication to large scale information systems. IEEE Journal on Selected Areas in Communications. SAC-3(3): 457-467.
-
(1985)
IEEE Journal on Selected Areas in Communications
, vol.3
, Issue.3
, pp. 457-467
-
-
Gilford, D.K.1
Lucassen, J.M.2
Berlin, S.T.3
-
22
-
-
0025824847
-
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
-
Golic, Jovan Dj., and Miodrag J. Mihaljevic. 1991. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology. 3(3): 201-212.
-
(1991)
Journal of Cryptology
, vol.3
, Issue.3
, pp. 201-212
-
-
Golic, J.D.1
Mihaljevic, M.J.2
-
24
-
-
0004201481
-
-
Laguna Hills, CA: Aegean Park Press
-
Golomb, Solomon. 1982. Shift Register Sequences. Laguna Hills, CA: Aegean Park Press.
-
(1982)
Shift Register Sequences
-
-
Golomb, S.1
-
25
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
Heilman, Martin E. 1980. A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory. IT-26(4): 401-406.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.4
, pp. 401-406
-
-
Heilman, M.E.1
-
26
-
-
0004271915
-
-
Second edition. Englewood Cliffs: Prentice-Hall
-
Hoffman, Kenneth, and Ray Kunze. 1971. Linear Algebra. Second edition. Englewood Cliffs: Prentice-Hall.
-
(1971)
Linear Algebra
-
-
Hoffman, K.1
Kunze, R.2
-
27
-
-
0004220560
-
-
New York: Springer-Verlag
-
Hungerford, Thomas W. 1974. Algebra. New York: Springer-Verlag.
-
(1974)
Algebra
-
-
Hungerford, T.W.1
-
28
-
-
0004271904
-
-
New York: W. H. Freeman and Company
-
Jacob, Bill. 1990. Linear Algebra. New York: W. H. Freeman and Company.
-
(1990)
Linear Algebra
-
-
Jacob, B.1
-
29
-
-
0017017134
-
An analysis of the structure and complexity of nonlinear binary sequence generators
-
Key, Edwin L. 1976. An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory. IT-22(6): 732-736.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 732-736
-
-
Key, E.L.1
-
30
-
-
0028675685
-
The vulnerability of geometric sequences based on fields of odd characteristic
-
Klapper, Andrew. 1994. The vulnerability of geometric sequences based on fields of odd characteristic. Journal of Cryptology. 7(1): 33-51.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 33-51
-
-
Klapper, A.1
-
33
-
-
85023792726
-
Factoring large integers by solving Boolean equations
-
Computer Science Department, University of Maryland Baltimore County
-
Lomonaco, Samuel J. Jr. 1989. Factoring large integers by solving Boolean equations. Unpublished manuscript, Computer Science Department, University of Maryland Baltimore County.
-
(1989)
Unpublished Manuscript
-
-
Lomonaco, S.J.J.1
-
35
-
-
0011019140
-
-
Version ten. Mathlab Group, MIT Laboratory for Computer Science
-
Macsyma Reference Manual. Version ten. Mathlab Group, MIT Laboratory for Computer Science.
-
(1983)
Macsyma Reference Manual
-
-
-
37
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
Meier, Willi, and Othmar Stafelbach. 1989. Fast correlation attacks on certain stream ciphers. Journal of Cryptology. 1(3): 159-176.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Stafelbach, O.2
-
43
-
-
0003959092
-
-
Rueppel, Rainer A. 1992. Stream ciphers. In [47]. Chapter 2. 65-134.
-
(1992)
Stream ciphers
, vol.47
, Issue.2
, pp. 65-134
-
-
Rueppel, R.A.1
-
44
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, Claude E. 1949. Communication theory of secrecy systems. Bell System Technical Journal. 28: 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
46
-
-
85034624593
-
Cryptanalyst’s representation of nonlinearly filtered ML-sequences. Advances in Cryptology—Eurocrypt ’85
-
Siegenthaler, T. 1985. Cryptanalyst’s representation of nonlinearly filtered ML-sequences. Advances in Cryptology—Eurocrypt ’85, Springer-Verlag. 103-110.
-
(1985)
Springer-Verlag
, pp. 103-110
-
-
Siegenthaler, T.1
-
49
-
-
0026105188
-
Pseudorandom bit generators in stream-cipher cryptography
-
Zeng, Kencheng, Chung-Huang Yang, Dah-Yea Wei, and T. R. N. Rao. 1991. Pseudorandom bit generators in stream-cipher cryptography. Computer. 24(2): 8-17.
-
(1991)
Computer
, vol.24
, Issue.2
, pp. 8-17
-
-
Zeng, K.1
Yang, C.-H.2
Wei, D.-Y.3
Rao, T.R.N.4
|