1

Constrained many-to-one string editing with memory

Year:
1995
Language:
english
File:
PDF, 636 KB
english, 1995
2

Correlation properties of a general binary combiner with memory

Year:
1996
Language:
english
File:
PDF, 983 KB
english, 1996
3

Statistical Weakness of Multiplexed Sequences

Year:
2002
Language:
english
File:
PDF, 152 KB
english, 2002
5

A probabilistic cryptanalytic method for a time-variant permutation generator

Year:
2001
Language:
english
File:
PDF, 76 KB
english, 2001
6

Fast correlation attacks on nonlinear filter generators

Year:
1997
Language:
english
File:
PDF, 564 KB
english, 1997
7

Stream cipher encryption of random access files

Year:
1999
Language:
english
File:
PDF, 380 KB
english, 1999
8

How to Construct Cryptographic Primitives from Stream Ciphers

Year:
2001
Language:
english
File:
PDF, 149 KB
english, 2001
10

On Matroid Characterization of Ideal Secret Sharing Schemes

Year:
1998
Language:
english
File:
PDF, 129 KB
english, 1998
11

Fast Correlation Attacks on the Summation Generator

Year:
2000
Language:
english
File:
PDF, 103 KB
english, 2000
12

Vectorial Approach to Fast Correlation Attacks

Year:
2005
Language:
english
File:
PDF, 131 KB
english, 2005
13

Optimal correlation attack on the multiplexer generator

Year:
2009
Language:
english
File:
PDF, 261 KB
english, 2009
14

Methods for testing subblock patterns

Year:
1999
Language:
english
File:
PDF, 145 KB
english, 1999
15

Automated statistical methods for measuring the strength of block ciphers

Year:
1997
Language:
english
File:
PDF, 454 KB
english, 1997
16

Correlation attacks on up/down and stop/go cascades

Year:
1999
Language:
english
File:
PDF, 542 KB
english, 1999
17

Iterative optimum symbol-by-symbol decoding and fast correlation attacks

Year:
2001
Language:
english
File:
PDF, 438 KB
english, 2001
18

Vectorial Boolean functions and induced algebraic equations

Year:
2006
Language:
english
File:
PDF, 244 KB
english, 2006
20

Universal masking on logic gate level

Year:
2004
Language:
english
File:
PDF, 1.24 MB
english, 2004
22

Constrained Embedding Probability for Two Binary Strings

Year:
1996
Language:
english
File:
PDF, 556 KB
english, 1996
23

A new authentication model for ad hoc networks

Year:
2012
Language:
english
File:
PDF, 338 KB
english, 2012
25

Iterative probabilistic decoding and parity checks with memory

Year:
1999
Language:
english
File:
PDF, 458 KB
english, 1999
27

Computation of low-weight parity-check polynomials

Year:
1996
Language:
english
File:
PDF, 326 KB
english, 1996
28

Conditional correlation attack on combiners with memory

Year:
1996
Language:
english
File:
PDF, 421 KB
english, 1996