Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1304082 - MaRDI portal

scientific article; zbMATH DE number 1304082

From MaRDI portal
Publication:4250772

zbMath0931.94027MaRDI QIDQ4250772

Thomas Johansson, Fredrik Jonsson

Publication date: 17 June 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (21)

Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functionsLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Correlation attacks on combination generatorsA survey on fast correlation attacksA discrete logarithm-based approach to compute low-weight multiples of binary polynomialsCorrelation (Fast) Attack against Nonlinear Combination GeneratorImproved multi-pass fast correlation attacks with applicationsFast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3GError-correcting codes and cryptographyAttacks Against Filter Generators Exploiting Monomial MappingsPractical cryptanalysis of Bluetooth encryption with condition maskingConcatenating indicators of flats for designing cryptographic functionsОценки объемов окрестностей двоичных кодов в терминах их весовых спектровSecurity of Y-00 under heterodyne measurement and fast correlation attackCryptanalysis of an E0-like combiner with memoryAlgebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift RegistersAn Improved Fast Correlation Attack on Stream CiphersOn ε‐biased generators in NC0On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functionsEfficient design methods of low-weight correlation-immune functions and revisiting their basic characterizationA fast correlation attack on LILI-128




This page was built for publication: