How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Analysis and design of stream ciphers
Analysis and design of stream ciphers
A simple unpredictable pseudo random number generator
SIAM Journal on Computing
Cryptanalysts representation of nonlinearly filtered ML-sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
On functions of linear shift register sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Finite field for scientists and engineers
Finite field for scientists and engineers
Products of linear recurring sequences with maximum complexity
IEEE Transactions on Information Theory
Codes and cryptography
Lock-in effect in cascades of clock-controlled shift-registers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Inferring sequences produced by a linear congruential generator missing low-order bits
Journal of Cryptology
Propagation characteristics of Boolean functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A provably-secure strongly-randomized cipher
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Correlation properties of combiners with memory in stream ciphers
Journal of Cryptology - Eurocrypt '90
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Shift Register Sequences
The Differential Cryptanalysis and Design of Natural Stream Ciphers
Fast Software Encryption, Cambridge Security Workshop
A Software-Optimised Encryption Algorithm
Fast Software Encryption, Cambridge Security Workshop
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
On the existence of secure feedback registers
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |