Finite Automata and Application to Cryptography
From MaRDI portal
Publication:3508382
DOI10.1007/978-3-540-78257-5zbMath1157.68044OpenAlexW1607652161MaRDI QIDQ3508382
Publication date: 30 June 2008
Full work available at URL: https://doi.org/10.1007/978-3-540-78257-5
linearizationerror propagationfinite automatapublic key cryptosystemweakly invertiblelinear shift registerbounded error propagationfeedforward invertiblemutual invertibility
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Formal languages and automata (68Q45) Cryptography (94A60)
Related Items (3)
A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA ⋮ The p-adic Theory of Automata Functions ⋮ An extended strange planet protocol
This page was built for publication: Finite Automata and Application to Cryptography