Cryptographic properties of nonlinear pseudorandom number generators
暂无分享,去创建一个
[1] Nicholas Kolokotronis,et al. On the linear complexity of nonlinearly filtered PN-sequences , 2003, IEEE Trans. Inf. Theory.
[2] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[3] Tor Helleseth,et al. Alinear weakness in the Klimov-Shamir T-function , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[4] David L. desJardins,et al. Polynomial Mappings mod p^n , 2001 .
[5] Vladimir Anashin,et al. Uniformly distributed sequences of p-adic integers, II , 2002, math/0209407.
[6] Magnus Daum,et al. Narrow T-Functions , 2005, FSE.
[7] V. S. Anachin. Uniformly distributed sequences ofp-adic integers , 1994 .
[8] Vladimir Anashin,et al. Non-Archimedean analysis, T-functions, and cryptography , 2006, ArXiv.
[9] Adi Shamir,et al. A New Class of Invertible Mappings , 2002, CHES.
[10] G. Mayhew,et al. Auto-correlation properties of modified de Bruijn sequences , 2000, IEEE 2000. Position Location and Navigation Symposium (Cat. No.00CH37062).
[11] Donald E. Knuth,et al. The Art of Computer Programming, Volumes 1-3 Boxed Set , 1998 .
[12] Vladimir Anashin,et al. Uniformly distributed sequences in computer algebra or how to construct program generators of random numbers , 1998 .
[13] M. V. Larin,et al. Transitive polynomial transformations of residue class rings , 2002 .
[14] Adi Shamir,et al. Cryptographic Applications of T-Functions , 2003, Selected Areas in Cryptography.
[15] Vladimir Anashin,et al. Pseudorandom number generation by p-adic ergodic transformations: an addendum , 2004, ArXiv.
[16] Dong Hoon Lee,et al. A New Class of Single Cycle T-Functions , 2005, FSE.
[17] Vladimir Anashin. Wreath Products in Stream Cipher Design , 2006, ArXiv.
[18] Adi Shamir,et al. New Applications of T-Functions in Block Ciphers and Hash Functions , 2005, FSE.
[19] Thomas Peyrin,et al. Linear Cryptanalysis of the TSC Family of Stream Ciphers , 2005, ASIACRYPT.
[20] Adi Shamir,et al. New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.
[21] R. Rivest. Permutation Polynomials Modulo 2w , 2001 .
[22] Palash Sarkar,et al. Time-Memory Trade-Off Attacks on Multiplications and T-Functions , 2004, ASIACRYPT.
[23] Nicholas Kolokotronis,et al. Cryptographic Properties of Stream Ciphers Based on T-functions , 2006, 2006 IEEE International Symposium on Information Theory.