The orders of equidistribution of subsequences of some asymptotically random sequences
Communications of the ACM
Linear Dependencies in Linear Feedback Shift Registers
IEEE Transactions on Computers
On functions of linear shift register sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Linear complexity and random sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
On the linear span of binary sequences obtained from finite geometries
Proceedings on Advances in cryptology---CRYPTO '86
Measuring VAX 8800 performance with a histogram hardware monitor
ISCA '88 Proceedings of the 15th Annual International Symposium on Computer architecture
A new class of nonlinear functions for running-key generators
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Polynomial Testing of Packet Switching Networks
IEEE Transactions on Computers
A New Algorithm for Multiplication in Finite Fields
IEEE Transactions on Computers
Range Image Acquisition with a Single Binary-Encoded Light Pattern
IEEE Transactions on Pattern Analysis and Machine Intelligence
Design for testability and diagnosis in a VLSI CMOS System/370 processor
IBM Journal of Research and Development
Cellular automata circuits for built-in self test
IBM Journal of Research and Development
Analysis of Detection Probability and Some Applications
IEEE Transactions on Computers
Pseudorandom Bit Generators in Stream-Cipher Cryptography
Computer - Special issue on cryptography
A New Framework for Designing and Analyzing BIST Techniques and Zero Aliasing Compression
IEEE Transactions on Computers
The shortest feedback shift register that can generate a given sequence
CRYPTO '89 Proceedings on Advances in cryptology
Aliasing Probabilities for Feedback Signature Compression of Test Data
IEEE Transactions on Computers
Analysis and Design of Linear Finite State Machines for Signature Analysis Testing
IEEE Transactions on Computers
An efficient parallel algorithm for all pairs examination
Proceedings of the 1991 ACM/IEEE conference on Supercomputing
IEEE Transactions on Computers
Universality of iterated networks
SPAA '92 Proceedings of the fourth annual ACM symposium on Parallel algorithms and architectures
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Relating the Cyclic Behavior of Linear and Intrainverted Feedback Shift Registers
IEEE Transactions on Computers
Minimal shift counters and frequency division
DAC '93 Proceedings of the 30th international Design Automation Conference
Systematic generation of cryptographically robust S-boxes
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Lightwave networks based on de Bruijn graphs
IEEE/ACM Transactions on Networking (TON)
How to break Gifford's cipher (extended abstract)
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Linear Models for Keystream Generators
IEEE Transactions on Computers
Strong deviations from randomness in m-sequences based on trinomials
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A Multiple-Sequence Generator Based on Inverted Nonlinear Autonomous Machines
IEEE Transactions on Computers
Counting Two-State Transition-Tour Sequences
IEEE Transactions on Computers
Programmable BIST Space Compactors
IEEE Transactions on Computers
Generating De Bruijn Sequences: An Efficient Implementation
IEEE Transactions on Computers
An Approximate Distribution for the Maximum Order Complexity
Designs, Codes and Cryptography
Cross-Correlations of Quadratic Form Sequences in OddCharacteristic
Designs, Codes and Cryptography
BIST Pattern Generators Using Addition and Subtraction Operations
Journal of Electronic Testing: Theory and Applications - Special issue on test synthesis
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
Key management for encrypted broadcast
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Mixed-Mode BIST Using Embedded Processors
Journal of Electronic Testing: Theory and Applications - Special issue on On-line testing
A Bist Scheme for Non-Volatile Memories
Journal of Electronic Testing: Theory and Applications - Special issue on On-line testing
An Algorithm for Generating Stable Feedback Shift Registers of Order n
Journal of the ACM (JACM)
A Generalization of Shift-Register Sequence Generators
Journal of the ACM (JACM)
The Runs Up-and-Down Performance of Tausworthe Pseudo-Random Number Generators
Journal of the ACM (JACM)
An Asymptotically Random Tausworthe Sequence
Journal of the ACM (JACM)
On a Lightwave Network Topology Using Kautz Digraphs
IEEE Transactions on Computers
Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
The k-distribution of generalized feedback shift register pseudorandom numbers
Communications of the ACM
Algorithm 806: SPRNG: a scalable library for pseudorandom number generation
ACM Transactions on Mathematical Software (TOMS)
Execution time requirements for encipherment programs
Communications of the ACM
LFSR-Based Deterministic TPG for Two-Pattern Testing
Journal of Electronic Testing: Theory and Applications - Special Issue on the 7th ASIAN TEST SYMPOSIUM, ATS-98
Some approaches to best-match file searching
Communications of the ACM
A comparison of the correlational behavior of random number generators for the IBM 360
Communications of the ACM
Irreducible trinomials over finite fields
Proceedings of the 2001 international symposium on Symbolic and algebraic computation
FPGA implementation of neighborhood-of-four cellular automata random number generators
FPGA '02 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays
Generalized Lehmer-Tausworthe random number generators
ACM-SE 30 Proceedings of the 30th annual Southeast regional conference
Trace Representation of Legendre Sequences
Designs, Codes and Cryptography
Nondeterminism and succinctly representable regular languages
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
An RNS Architecture for Quasi-Chaotic Oscillators
Journal of VLSI Signal Processing Systems
Implementation of a portable and reproducible parallel pseudorandom number generator
Proceedings of the 1994 ACM/IEEE conference on Supercomputing
Spreading Codes Generator for Wireless CDMA Networks
Wireless Personal Communications: An International Journal
Pseudorandom Testing for Boundary-Scan Design with Built-In Self-Test
IEEE Design & Test
A Tutorial on Built-in Self-Test. I. Principles
IEEE Design & Test
Exhaustive Test Pattern Generation Using Cyclic Codes
IEEE Transactions on Computers
Design of Self-Diagnostic Boards by Multiple Signature Analysis
IEEE Transactions on Computers
IEEE Transactions on Computers
Identifying Minimal Shift Counters: A Search Technique
IEEE Transactions on Computers
Can Nonlinear Compactors Be Better than Linear Ones?
IEEE Transactions on Computers
BIST Test Pattern Generators for Two-Pattern Testing-Theory and Design Algorithms
IEEE Transactions on Computers
IEEE Transactions on Computers
Theory of Extended Linear Machines
IEEE Transactions on Computers
On the balancedness of nonlinear generators of binary sequences
Information Processing Letters
New Lower Bounds on the Periodic Crosscorrelation of QAM Codes with Arbitrary Energy
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Properties of Finite Response Input Sequences of Recursive Convolutional Codes
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
On the Aperiodic Correlation Function of Galois Ring m-Sequences
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Improved Cryptanalysis of the Self-Shrinking Generator
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Primitive Polynomials over GF(2) - A Cryptologic Approach
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A New Statistical Testing for Symmetric Ciphers and Hash Functions
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Message Authentication Codes with Error Correcting Capabilities
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Elliptic Curve Pseudorandom Sequence Generators
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On Welch-Gong Transformation Sequence Generators
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Multiples of Primitive Polynomials and Their Products over GF(2)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Cryptoanalysis Based on 2-Adic Rational Approximation
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
BDD-Based Cryptanalysis of Keystream Generators
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Multiples of Primitive Polynomials over GF(2)
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Efficient Software Implementation of Linear Feedback Shift Registers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Random Number Generation with +-NFAs
CIAA '01 Revised Papers from the 6th International Conference on Implementation and Application of Automata
On the Interpolation Attacks on Block Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A New Ultrafast Stream Cipher Design: COS Ciphers
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Efficient Implementation of "Large" Stream Cipher Systems
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
The MERLin Environment Applied to *-NFAs
CIAA '00 Revised Papers from the 5th International Conference on Implementation and Application of Automata
The GH Public-Key Cryptosystem
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
On the Generation of Pseudo-Deterministic Two-Patterns Test Sequence with LFSRs
EDTC '97 Proceedings of the 1997 European conference on Design and Test
Fast hardware random number generator for the Tausworthe sequence
ANSS '83 Proceedings of the 16th annual symposium on Simulation
Design and study of a strong crypto-system model for e-Commerce
ICCC '02 Proceedings of the 15th international conference on Computer communication
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
DS-LFSR: A New BIST TPG for Low Heat Dissipation
ITC '97 Proceedings of the 1997 IEEE International Test Conference
TREE-STRUCTURED LINEAR CELLULAR AUTOMATA AND THEIR APPLICATIONS AS PRPGS
ITC '97 Proceedings of the 1997 IEEE International Test Conference
Pseudoexhaustive TPG with a Provably Low Number of LFSR Seeds
ICCD '00 Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
Interesting inner-product scans
Proceedings of the 2003 conference on APL: stretching the mind
Random difference equations: an asymptotical result
Journal of Computational and Applied Mathematics
LT-RTPG: A New Test-Per-Scan BIST TPG for Low Heat Dissipation
ITC '99 Proceedings of the 1999 IEEE International Test Conference
A system of high-dimensional, efficient, long-cycle and portable uniform random number generators
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Efficient multiply-with-carry random number generators with maximal period
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Irreducible trinomials over finite fields
Mathematics of Computation
Cryptography and cryptographic protocols
Distributed Computing - Papers in celebration of the 20th anniversary of PODC
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes
Designs, Codes and Cryptography
Tuning the collision test for power
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Planar High Performance Ring Generators
VTS '04 Proceedings of the 22nd IEEE VLSI Test Symposium
Periodicity and Correlation Properties of d-FCSR Sequences
Designs, Codes and Cryptography
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
A Generalized Method for Constructing Subquadratic Complexity GF(2^k) Multipliers
IEEE Transactions on Computers
Computer simulation of road surface profiles for a four-wheeled vehicle
WSC '82 Proceedings of the 14th conference on Winter Simulation - Volume 1
On binary ⊕-NFAs and succinct descriptions of regular languages
Theoretical Computer Science - Implementation and application of automata
Modified Alternating$$\vec{k}$$--generators
Designs, Codes and Cryptography
Design of long period pseudo-random sequences from the addition of m-sequences over Fp
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
High Performance Dense Ring Generators
IEEE Transactions on Computers
Test Sequence Construction Using Minimum Information on the Tested System
Programming and Computing Software
Affine equivalence in the AES round function
Discrete Applied Mathematics
Periodicity, complementarity and complexity of 2-adic FCSR combiner generators
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Journal of VLSI Signal Processing Systems
On linear complexity of sequences over GF(2n)
Theoretical Computer Science
De Bruijn digraphs and affine transformations
European Journal of Combinatorics
Foundations of cryptography: a primer
Foundations and Trends® in Theoretical Computer Science
A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion
Neural Processing Letters
ASR: Adaptive Selective Replication for CMP Caches
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture
Results on multiples of primitive polynomials and their products over GF(2)
Theoretical Computer Science
The origins of combinatorics on words
European Journal of Combinatorics
Private stateful circuits secure against probing attacks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Two-tuple balance of non-binary sequences with ideal two-level autocorrelation
Discrete Applied Mathematics
Pseudorandom recursions: small and fast pseudorandom number generators for embedded applications
EURASIP Journal on Embedded Systems
Division of trinomials by pentanomials and orthogonal arrays
Designs, Codes and Cryptography
Hybrid one-dimensional reversible cellular automata are regular
Discrete Applied Mathematics
A BIST TPG for low power dissipation and high fault coverage
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Minimal polynomials of the modified de Bruijn sequences
Discrete Applied Mathematics
Investigating some special sequence lengths generated in an external exclusive-NOR type LFSR
Computers and Electrical Engineering
Linear cellular automata as discrete models for generating cryptographic sequences
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
On the linear complexity of some new q-ary sequences
Information Sciences: an International Journal
Trace representation of some generalized cyclotomic sequences of length pq
Information Sciences: an International Journal
Hybrid BIST optimization using reseeding and test set compaction
Microprocessors & Microsystems
On analysis and synthesis of (n, k)-non-linear feedback shift registers
Proceedings of the conference on Design, automation and test in Europe
Binary Sequences with Three and Four Level Autocorrelation
Computational Intelligence and Security
Four Families of Binary Sequences with Low Correlation and Large Linear Complexity
Information Security and Cryptology
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators
Information Security and Cryptology
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
On the Representation of Gliders in Rule 54 by De Bruijn and Cycle Diagrams
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
Some Results on the Arithmetic Correlation of Sequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Parallel Generation of l-Sequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
On the Use of Linear Cellular Automata for the Synthesis of Cryptographic Sequences
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
Strategic attack on the shrinking generator
Theoretical Computer Science
Randomness quality of permuted pseudorandom binary sequences
Mathematics and Computers in Simulation
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
Fast Marker Based C-Arm Pose Estimation
MICCAI '08 Proceedings of the 11th International Conference on Medical Image Computing and Computer-Assisted Intervention, Part II
Scalable parallel multiple recursive generators of large order
Parallel Computing
Design considerations for cryptography
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Conflict-free memory allocation for associative data files
AFIPS '83 Proceedings of the May 16-19, 1983, national computer conference
Reconfigurable fault-tolerant multicomputer network
AFIPS '83 Proceedings of the May 16-19, 1983, national computer conference
Reconfigurable multicomputer networks for very fast real-time applications
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Modified clock-controlled alternating step generators
Computer Communications
A new class of pseudo-random sequences from Mersenne numbers
International Journal of Information and Coding Theory
Maximal-Period Sequences Generated by Feedback-Limited Nonlinear Shift Registers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Group-Linking Method: A Unified Benchmark for Machine Learning with Recurrent Neural Network
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Linearization Method and Linear Complexity
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Quasi-commutative watermarking and encryption for secure media content distribution
Multimedia Tools and Applications
Studies on the distribution of the shortest linear recurring sequences
Information Sciences: an International Journal
Reducible Polynomial over $\mathbb{F}_{2}$ Constructed by Trinomial σ-LFSR
Information Security and Cryptology
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
System-on-Chip Test Architectures: Nanometer Design for Testability
System-on-Chip Test Architectures: Nanometer Design for Testability
An efficient implementation algorithm for generating de Bruijn sequences
Computer Standards & Interfaces
Analyzing a class of pseudo-random bit generator through inductive machine learning paradigm
Intelligent Data Analysis
Rate variable, multi-binary turbo codes with controlled error-floor
IEEE Transactions on Communications
Efficient generation and correlation of sequence pairs with three zero-correlation zones
IEEE Transactions on Signal Processing
Memory-m antipodal processes: spectral analysis and synthesis
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Revisiting the spread spectrum sliding correlator: why filtering matters
IEEE Transactions on Wireless Communications
Random-pattern coverage enhancement and diagnosis for LSSD logic self-test
IBM Journal of Research and Development
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Theoretical Issues of Cluster Pattern Interfaces
IWCIA '09 Proceedings of the 13th International Workshop on Combinatorial Image Analysis
Depth from Encoded Sliding Projections
ISVC '09 Proceedings of the 5th International Symposium on Advances in Visual Computing: Part I
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Affine equivalence in the AES round function
Discrete Applied Mathematics
A Cellular Automata based method for predicting binary sequences
AIA '08 Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications
A transformation from the Fibonacci to the Galois NLFSRs
IEEE Transactions on Information Theory
Large period nearly de Bruijn FCSR sequences
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Random number generators with period divisible by a Mersenne prime
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
Design of compact, universal DNA microarrays for protein binding microarray experiments
RECOMB'07 Proceedings of the 11th annual international conference on Research in computational molecular biology
Succinct descriptions of regular languages with binary ⊕-NFAs
CIAA'03 Proceedings of the 8th international conference on Implementation and application of automata
The Ehrenfeucht-Mycielski sequence
CIAA'03 Proceedings of the 8th international conference on Implementation and application of automata
Clock-controlled shrinking generator of feedback shift registers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
On the number of equivalence classes in certain stream ciphers
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
On the efficiency of the clock control guessing attack
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
On a resynchronization weakness in a class of combiners with memory
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Efficient linkable ring signatures and threshold signatures from linear feedback shift register
ICA3PP'07 Proceedings of the 7th international conference on Algorithms and architectures for parallel processing
Image quantisation on a massively parallel embedded processor
SAMOS'07 Proceedings of the 7th international conference on Embedded computer systems: architectures, modeling, and simulation
Efficient blind signatures from linear feedback shift register
CDVE'07 Proceedings of the 4th international conference on Cooperative design, visualization, and engineering
LFSR based stream ciphers are vulnerable to power attacks
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Linkable ring signatures from linear feedback shift register
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Linear complexity and autocorrelation of prime cube sequences
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Remarks on the new attack on the filter generator and the role of high order complexity
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
A systems theoretic approach to the design of scalable cryptographic hash functions
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
Application of linear hybrid cellular automata to stream ciphers
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
A fast stream cipher with huge state space and quasigroup filter for software
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Periodic binary sequences: solved and unsolved problems
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
Existence of modular sonar sequences of twin-prime product length
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
Randomness and representation of span n sequences
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
Balancedness in binary sequences with cryptographic applications
PPAM'07 Proceedings of the 7th international conference on Parallel processing and applied mathematics
Linearization of stream ciphers by means of concatenated automata
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Typical peak sidelobe level of binary sequences
IEEE Transactions on Information Theory
Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations
IEEE Transactions on Information Theory
Modified self-shrinking generator
Computers and Electrical Engineering
A set of triphase coded waveforms: design, analysis and application to radar system
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
The linear complexity of some binary sequences with three-level autocorrelation
IEEE Transactions on Information Theory
How to speed-up your NLFSR-based stream cipher
Proceedings of the Conference on Design, Automation and Test in Europe
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
An algorithm for constructing a fastest Galois NLFSR generating a given sequence
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
On the secrecy of spread-spectrum flow watermarks
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A novel stream cipher for cryptographic applications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Adjacencies Between the Cycles of a Shift Register with Characteristic Polynomial (1 + x)n
IEEE Transactions on Computers
The linear complexity of binary sequences with optimal autocorrelation
IEEE Transactions on Information Theory
IEEE Transactions on Signal Processing
Chaotic cellular automata with cryptographic application
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Optimized punctured ZCZ sequence-pair set: design, analysis, and application to radar system
EURASIP Journal on Wireless Communications and Networking - Special issue on radar and sonar sensor networks
Analysis of the generalized self-shrinking generator
Computers & Mathematics with Applications
ITC'84 Proceedings of the 1984 international test conference on The three faces of test: design, characterization, production
Pseudo-exhaustive testing of sequential machines using signature analysis
ITC'84 Proceedings of the 1984 international test conference on The three faces of test: design, characterization, production
Iterative message passing techniques for rapid code acquisition
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Bounds on pseudoexhaustive test lengths
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Cryptanalytic attack on the self-shrinking sequence generator
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
Structural properties of cryptographic sequences
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
A sample of samplers: a computational perspective on sampling
Studies in complexity and cryptography
Generation of pseudorandom binary sequences with controllable cryptographic parameters
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part I
Evolutionary construction of de bruijn sequences
Proceedings of the 4th ACM workshop on Security and artificial intelligence
New guess-and-determine attack on the self-shrinking generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Deterministic analysis of balancedness in symmetric cryptography
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
A deterministic approach to balancedness and run quantification in pseudorandom pattern generators
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Systolic routing in an optical fat tree
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Linear filtering of nonlinear shift-register sequences
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Frequency/Time hopping sequences with large linear complexities
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Analysis of the bit-search generator and sequence compression techniques
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Efficient application of hybrid 150/90 cellular automata to symmetric cryptography
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Modelling of complex cryptographic systems in terms of simple cellular automata
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
Synthesis of parallel binary machines
Proceedings of the International Conference on Computer-Aided Design
How to embed short cycles into large nonlinear feedback-shift registers
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Improvement of the edit distance attack to clock-controlled LFSR-Based stream ciphers
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Concatenated automata in cryptanalysis of stream ciphers
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
A simple acceptance/rejection criterium for sequence generators in symmetric cryptography
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Systolic routing in an optical butterfly
PaCT'05 Proceedings of the 8th international conference on Parallel Computing Technologies
A survey of the merit factor problem for binary sequences
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
Algebraic feedback shift registers based on function fields
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
On the classification of periodic binary sequences into nonlinear complexity classes
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On the distinctness of decimations of generalized l-sequences
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
How to strengthen pseudo-random generators by using compression
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
On algebraic immunity and annihilators
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
A partial image encryption method with pseudo random sequences
ICISS'06 Proceedings of the Second international conference on Information Systems Security
On the linearity of cryptographic sequence generators
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
Pseudorandom generator to strengthen cooperation in VANETs
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
On the stability of m-sequences
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
WSEAS Transactions on Circuits and Systems
Divisibility of polynomials over finite fields and combinatorial applications
Designs, Codes and Cryptography
Swan's theorem for binary tetranomials
Finite Fields and Their Applications
New pairs of m-sequences with 4-level cross-correlation
Finite Fields and Their Applications
Revisiting butson hadamard matrix construction based on a prominent class of pseudo-random sequences
Proceedings of the CUBE International Information Technology Conference
Searching short recurrences of nonlinear shift registers via directed acyclic graphs
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Computing the linear complexity for sequences with characteristic polynomial fv
Cryptography and Communications
An improved hardware implementation of the grain-128a stream cipher
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
About balance property of the p-ary generalized self-shrinking generator sequence
Proceedings of the 14th International Conference on Computer Systems and Technologies
Study on the statistical test for string pseudorandom number generators
BICS'13 Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems
Algorithm 938: Compressing circular buffers
ACM Transactions on Mathematical Software (TOMS)
Dual partitioning multicasting for high-performance on-chip networks
Journal of Parallel and Distributed Computing
Hi-index | 0.47 |
From the Publisher:Shift register sequences are used in a broad range of applications, particularly in random number generation, multiple access and polling techniques, secure and privacy communication systems, error detecting and correcting codes, and synchronization pattern generation, as well as in modern cryptographic systems. The first edition of Shift Register Sequences, published in 1967, has been for many years the definitive work on this subject. In the revised edition, Dr. Golomb has added valuable supplemental material. The Revised Edition contains a comprehensive bibliography of some 400 entries which cover the literature concerning the theory and applications of shift register sequences. Written in a clear and lucid style, Dr. Golomb's approach is completely mathematical with rigorous proofs of all assertions. The proofs, however, may be omitted without loss of continuity by the reader who is interested only in results. Dr. Golomb is considered one of the foremost experts in the world with respect to combinatorial and geometrical aspects of coded communications.