A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher
Y. Tsunoo;T. Saito;H. Kubo;T. Suzaki
IEEE Transactions on Information Theory
Review of 'Principles of Communication Engineering' (Wozencrafi, J. M., and Jacobs, I. M.; 1965)
A. Viterbi
IEEE Transactions on Information Theory
Review of 'Telecommunication Systems Engineering' (Lindsey, W. C., and Simon, M. K.; 1973)
F. Glave
IEEE Transactions on Information Theory
Review of 'Random Differential Equations in Science and Engineering' (Soong, T. T.; 1973)
R. Pawula;N. Bershad
IEEE Transactions on Information Theory
Review of 'Automata Theory: An Engineering Approach' (Aleksander, I., and Hanna, F. K.; 1975)
J. Justesen
IEEE Transactions on Information Theory
Characteristics of application software maintenance
B. P. Lientz;E. B. Swanson;G. E. Tompkins
Communications of the ACM
A field study of the software design process for large systems
Bill Curtis;Herb Krasner;Neil Iscoe
Communications of the ACM
An empirical validation of software cost estimation models
Chris F Kemerer
Communications of the ACM