The probabilistic theory of linear complexity
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A new class of nonlinear functions for running-key generators
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Lock-in effect in cascades of clock-controlled shift-registers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Pseudorandom Bit Generators in Stream-Cipher Cryptography
Computer - Special issue on cryptography
Propagation characteristics of Boolean functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
The linear complexity profile and the jump complexity of keystream sequences
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Lower bounds for the linear complexity of sequences over residue rings
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Correlation properties of combiners with memory in stream ciphers (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
On constructions and nonlinearity of correlation immune functions
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to break Gifford's cipher (extended abstract)
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
An Approximate Distribution for the Maximum Order Complexity
Designs, Codes and Cryptography
A Note on Sequences with the Shift and Add Property
Designs, Codes and Cryptography
Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering
Designs, Codes and Cryptography
Generalized Inversion Attack on Nonlinear Filter Generators
IEEE Transactions on Computers
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Cryptography, trusted third parties and escrow
BT Technology Journal
Automated statistical methods for measuring the strength of block ciphers
Statistics and Computing
Parallel stream cipher for secure high-speed communications
Signal Processing
Protective Data Transformations in ACSs on the Basis of a New Primitive
Automation and Remote Control
Spreading Codes Generator for Wireless CDMA Networks
Wireless Personal Communications: An International Journal
Linear complexity, k-error linear complexity, and the discrete Fourier transform
Journal of Complexity
On the linear complexity profile of explicit nonlinear pseudorandom numbers
Information Processing Letters
On the balancedness of nonlinear generators of binary sequences
Information Processing Letters
Inversion Attack and Branching
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
The LILI-II Keystream Generator
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Analysis of SHA-1 in Encryption Mode
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
On Welch-Gong Transformation Sequence Generators
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
(Not So) Random Shuffles of RC4
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Universal Statistical Test for Random Bit Generators
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Nonlinear Parity Circuits and their Cryptographic Applications
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
On Correlation-Immune Functions
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Integrity Check Value Algorithm for Stream Ciphers
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
The First Experimental Cryptanalysis of the Data Encryption Standard
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Bounds for Resilient Functions and Orthogonal Arrays
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptoanalysis Based on 2-Adic Rational Approximation
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Linear Complexity of Periodic Sequences: A General Theory
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Improved Differential Attacks on RC5
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
A Complexity-Theoretic Approach to the Design of Good Measures of Cryptographic Strength
Computer Aided Systems Theory - EUROCAST 2001-Revised Papers
Decimation Attack of Stream Ciphers
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Cryptanalysis of the Nonlinear FeedForward Generator
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Analysis Methods for (Alleged) RCA
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
The Software-Oriented Stream Cipher SSC2
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
The Ubiquity of Reed-Muller Codes
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
The expected value of the joint linear complexity of periodic multisequences
Journal of Complexity
Efficient Implementation of Cryptographically Useful 'Large' Boolean Functions
IEEE Transactions on Computers
Design and study of a strong crypto-system model for e-Commerce
ICCC '02 Proceedings of the 15th international conference on Computer communication
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes
Designs, Codes and Cryptography
Journal of Complexity - Special issue on coding and cryptography
On the constructions and nonlinearity of binary vector-output correlation-immune functions
Journal of Complexity - Special issue on coding and cryptography
On the linear complexity profile of some new explicit inversive pseudorandom numbers
Journal of Complexity - Special issue on coding and cryptography
A wide family of nonlinear filter functions with a large linear span
Information Sciences—Informatics and Computer Science: An International Journal
New construction of resilient functions with satisfying multiple cryptographic criteria
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Designs, Codes and Cryptography
Modified Alternating$$\vec{k}$$--generators
Designs, Codes and Cryptography
Multi-sequences with d-perfect property
Journal of Complexity
Concatenating Indicators of Flats for Designing Cryptographic Functions
Designs, Codes and Cryptography
Some Notes on the Linear Complexity of Sidel'nikov-Lempel-Cohn-Eastman Sequences
Designs, Codes and Cryptography
On the joint linear complexity profile of explicit inversive multisequences
Journal of Complexity
Periodicity, complementarity and complexity of 2-adic FCSR combiner generators
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Enumeration results on linear complexity profiles and lattice profiles
Journal of Complexity
On linear complexity of sequences over GF(2n)
Theoretical Computer Science
Remarks on the k-error linear complexity of pn-periodic sequences
Designs, Codes and Cryptography
Error linear complexity measures for multisequences
Journal of Complexity
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Effective prediction and its computational complexity
CATS '07 Proceedings of the thirteenth Australasian symposium on Theory of computing - Volume 65
On the counting function of the lattice profile of periodic sequences
Journal of Complexity
Cryptographic properties of some binary generalized cyclotomic sequences with the length p2
Information Sciences: an International Journal
Designs, Codes and Cryptography
The generalized shrinking-multiplexing generator
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
The period of the LFSR based generalized shrinking-multiplexing generator
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
New Stream Cipher Designs
Sosemanuk, a Fast Software-Oriented Stream Cipher
New Stream Cipher Designs
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators
Information Security and Cryptology
Sequences, DFT and Resistance against Fast Algebraic Attacks
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity for k = 2 or 3
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Generalized Joint Linear Complexity of Linear Recurring Multisequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
A Fast Jump Ahead Algorithm for Linear Recurrences in a Polynomial Space
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Parallel Generation of l-Sequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
Cybernetics and Systems
On the linear complexity of Sidel'nikov sequences over nonprime fields
Journal of Complexity
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
Design and analysis of a highly secure stream cipher based on linear feedback shift register
Computers and Electrical Engineering
Linearization Method and Linear Complexity
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
New Weakness in the Key-Scheduling Algorithm of RC4
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Characterization of 2n-periodic binary sequences with fixed 2-error or 3-error linear complexity
Designs, Codes and Cryptography
Properties of the error linear complexity spectrum
IEEE Transactions on Information Theory
New results on periodic sequences with large k-error linear complexity
IEEE Transactions on Information Theory
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
On the joint linear complexity profile of explicit inversive multisequences
Journal of Complexity
Enumeration results on linear complexity profiles and lattice profiles
Journal of Complexity
Determining the complexity of FH/SS sequence by approximate entropy
IEEE Transactions on Communications
On the existence of secure feedback registers
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Fast low order approximation of cryptographic functions
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Ziv-Lempel complexity for periodic sequences and its cryptographic application
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Linear complexity of periodically repeated random sequences
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Enumerating nondegenerate permutations
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
New approaches to the design of self-synchronizing stream ciphers
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Correlation VIA linear sequential circuit approximation of combiners with memory
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Large period nearly de Bruijn FCSR sequences
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Some remarks on the cross correlation analysis of pseudo random generators
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Sequences with almost perfect linear complexity profile
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
When shift registers clock themselves
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On the number of equivalence classes in certain stream ciphers
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On a resynchronization weakness in a class of combiners with memory
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A survey of recent attacks on the filter generator
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
A highly nonlinear cellular FSM-combiner for stream ciphers
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
Attacks on the ESA-PSS-04-151 MAC scheme
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Revisiting correlation-immunity in filter generators
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
The linear vector space spanned by the nonlinear filter generator
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
Randomness and representation of span n sequences
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
On attacks on filtering generators using linear subspace structures
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
2-adic complexity of binary m-sequences
IEEE Transactions on Information Theory
Designs, Codes and Cryptography
Discrete Applied Mathematics
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Clock-controlled FCSR sequence with large linear complexity
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Cryptographic transformations of non-shannon sources of information
Cybernetics and Systems Analysis
A novel stream cipher for cryptographic applications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Cryptanalysis of the knapsack generator
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Generation of pseudorandom binary sequences with controllable cryptographic parameters
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part I
Extending the resynchronization attack
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Predicting subset sum pseudorandom generators
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Deterministic analysis of balancedness in symmetric cryptography
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
A deterministic approach to balancedness and run quantification in pseudorandom pattern generators
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
The efficient transmission scheme in wireless crypto communication
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Linear filtering of nonlinear shift-register sequences
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Frequency/Time hopping sequences with large linear complexities
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Analysis of the bit-search generator and sequence compression techniques
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Proof of a conjecture on the joint linear complexity profile of multisequences
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Design principles for combiners with memory
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Performance enhancement of wireless cipher communication
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
How to embed short cycles into large nonlinear feedback-shift registers
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Complexity-theoretical approaches to the design and analysis of cryptographical boolean functions
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Key generation based on elliptic curve over finite prime field
International Journal of Electronic Security and Digital Forensics
A simple acceptance/rejection criterium for sequence generators in symmetric cryptography
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
A survey of feedback with carry shift registers
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
Expected value of the linear complexity of two-dimensional binary sequences
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
On the 2-adic complexity and the k-error 2-adic complexity of periodic binary sequences
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
Asymptotic analysis on the normalized k-error linear complexity of binary sequences
Designs, Codes and Cryptography
The independence of two randomness properties of sequences over finite fields
Journal of Complexity
The probabilistic theory of the joint linear complexity of multisequences
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
The characterization of 2n-periodic binary sequences with fixed 1-error linear complexity
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Nonlinear complexity of binary sequences and connections with lempel-ziv compression
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On the expected value of the joint 2-adic complexity of periodic binary multisequences
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Lower bounds on sequence complexity via generalised vandermonde determinants
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Periodicity and distribution properties of combined FCSR sequences
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Partially perfect nonlinear functions and a construction of cryptographic boolean functions
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On the higher order nonlinearities of algebraic immune functions
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Highly reliable synchronous stream cipher system for link encryption
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
How to strengthen pseudo-random generators by using compression
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Algebraic attacks on clock-controlled stream ciphers
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Chaotic keystream generator using coupled NDFs with parameter perturbing
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Designing stream cipher systems using genetic programming
LION'05 Proceedings of the 5th international conference on Learning and Intelligent Optimization
A simple stream cipher with proven properties
Cryptography and Communications
Information Sciences: an International Journal
The minimal polynomial over Fq of linear recurring sequence over Fqm
Finite Fields and Their Applications
Lattice basis reduction algorithms and multi-dimensional continued fractions
Finite Fields and Their Applications
Enumeration results on the joint linear complexity of multisequences
Finite Fields and Their Applications
Finite Fields and Their Applications
Attack based on direct sum decomposition against the nonlinear filter generator
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Generalized correlation analysis of Vectorial Boolean functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Hi-index | 0.19 |