Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1024042 - MaRDI portal

scientific article; zbMATH DE number 1024042

From MaRDI portal
Publication:4341730

zbMath0871.94018MaRDI QIDQ4341730

Yishay Mansour, Hugo Krawczyk, Don Coppersmith

Publication date: 18 June 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generatorFault attack on the balanced shrinking generatorStrategic attack on the shrinking generatorOn the use of cellular automata in symmetric cryptographyModelling the shrinking generator in terms of linear CADiscrete linear models for the generalized self-shrunken sequencesShrinking generators based on \(\sigma \)-LFSRsCryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking GeneratorsA construction of primitive polynomials over finite fieldsRelated key chosen IV attacks on Decim v2 and Decim-128.Guess-and-Determine Algebraic Attack on the Self-Shrinking GeneratorModelling nonlinear sequence generators in terms of linear cellular automataSide Channel Attacks on Irregularly Decimated GeneratorsCellular Automata-Based Structures to Compute the Solutions of Linear Difference EquationsNonlinear Pseudorandom Sequences Based on 90/150 LHGCAGeneralization of the Self-Shrinking Generator in the Galois FieldJoint Hardware / Software Design of a Fast Stream CipherConstruction of primitive polynomials over finite fieldsAnalysis of the generalized self-shrinking generatorChaotic Cellular Automata with Cryptographic ApplicationA simple attack on some clock-controlled generatorsHow to Strengthen Pseudo-random Generators by Using CompressionSelf-shrinking chaotic stream ciphersReduced Complexity Attacks on the Alternating Step GeneratorSynthesis of cryptographic interleaved sequences by means of linear cellular automataRandomness quality of permuted pseudorandom binary sequencesLinear complexity of generalized sequences by comparison of PN-sequencesО подпоследовательностях марковских последовательностейShrinking generators and statistical leakageAn Improved Fast Correlation Attack on Stream CiphersSide channel cryptanalysis of product ciphers