Applications to Cryptography
暂无分享,去创建一个
[1] Robert E. Tarjan,et al. A Locally Adaptive Data , 1986 .
[2] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[3] Jovan Dj. Golic. Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator , 2000, ACISP.
[4] William I. Gasarch,et al. Book Review: An introduction to Kolmogorov Complexity and its Applications Second Edition, 1997 by Ming Li and Paul Vitanyi (Springer (Graduate Text Series)) , 1997, SIGACT News.
[5] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[6] Antoine Joux,et al. A Statistical Attack on RC6 , 2000, FSE.
[7] Andrei Fionov,et al. Basics of Contemporary Cryptography for IT Practitioners , 2005, Series on Coding Theory and Cryptology.
[8] Lawrence E. Bassham,et al. Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .
[9] M. Kendall,et al. The advanced theory of statistics , 1945 .
[10] G. Marsaglia. The Structure of Linear Congruential Sequences , 1972 .
[11] Pierre L'Ecuyer,et al. Uniform random number generation , 1994, Ann. Oper. Res..
[12] Sergey Doroshenko,et al. The experimental distinguishing attack on RC4 , 2006, IACR Cryptol. ePrint Arch..
[13] Marina Pudovkina. Statistical weaknesses in the alleged RC4 keystream generator , 2002, IACR Cryptol. ePrint Arch..
[14] Scott R. Fluhrer,et al. Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.
[15] R. Gallager. Information Theory and Reliable Communication , 1968 .
[16] K. Hotta. Non-BPS D9-Branes in the Early Universe(Universe, Phenomenology and Condensed matter,NONCOMMUTATIVE GEOMETRY AND QUANTUM SPACETIME IN PHYSICS) , 2006 .
[17] Burton S. Kaliski,et al. On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm , 1995, CRYPTO.
[18] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[19] G. Marsaglia,et al. Monkey tests for random number generators , 1993 .
[20] V. S. Stognienko,et al. A new test for randomness and its application to some cryptographic problems , 2004 .
[21] Peter Elias,et al. Interval and recency rank source coding: Two on-line adaptive variable-length schemes , 1987, IEEE Trans. Inf. Theory.
[22] B. Ya. Ryabko,et al. “Book Stack” as a New Statistical Test for Random Numbers , 2004, Probl. Inf. Transm..
[23] Sergey Doroshenko,et al. On ZK-Crypt, Book Stack, and Statistical Tests , 2006, IACR Cryptol. ePrint Arch..
[24] A. Kolmogorov. Three approaches to the quantitative definition of information , 1968 .
[25] A. C. Atkinson,et al. The handbook of random number generation and testing with Testrand computer code , 1981 .
[26] Alistair Moffat. An improved data structure for cumulative probability tables , 1999 .
[27] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[28] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[29] Jorma Rissanen,et al. Fast adaptive arithmetic code for large alphabet sources with asymmetrical distributions , 2003, IEEE Communications Letters.
[30] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[31] P. Billingsley,et al. Ergodic theory and information , 1966 .