Cryptographic Properties of Stream Ciphers Based on T-functions
暂无分享,去创建一个
[1] Thomas Peyrin,et al. Linear Cryptanalysis of the TSC Family of Stream Ciphers , 2005, ASIACRYPT.
[2] Nicholas Kolokotronis,et al. On the linear complexity of nonlinearly filtered PN-sequences , 2003, IEEE Trans. Inf. Theory.
[3] Harald Niederreiter,et al. Finite fields: Preface , 1996 .
[4] Richard A. Games,et al. A fast algorithm for determining the complexity of a binary sequence with period 2n , 1983, IEEE Trans. Inf. Theory.
[5] Rudolf Lide,et al. Finite fields , 1983 .
[6] Adi Shamir,et al. New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.
[7] Magnus Daum,et al. Narrow T-Functions , 2005, FSE.
[8] Palash Sarkar,et al. Time-Memory Trade-Off Attacks on Multiplications and T-Functions , 2004, ASIACRYPT.
[9] Tor Helleseth,et al. Alinear weakness in the Klimov-Shamir T-function , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[10] Adi Shamir,et al. Cryptographic Applications of T-Functions , 2003, Selected Areas in Cryptography.
[11] R. Rivest. Permutation Polynomials Modulo 2w , 2001 .
[12] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[13] Dong Hoon Lee,et al. A New Class of Single Cycle T-Functions , 2005, FSE.
[14] Adi Shamir,et al. New Applications of T-Functions in Block Ciphers and Hash Functions , 2005, FSE.