On functions of linear shift register sequences (English)
- New search for: Herlestam, T.
- New search for: Herlestam, T.
In:
Advances in Cryptology. EUROCRYPT'85. Proc. of a Workshop on the Theory and Application of Cryptographic Techniques
;
119-129
;
1986
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:On functions of linear shift register sequences
-
Additional title:Ueber Funktionen linearer Shiftregisterfolgen
-
Contributors:Herlestam, T. ( author )
-
Published in:Lecture Notes in Computer Science ; 219 ; 119-129
-
Publisher:
- New search for: Springer-Verlag
-
Place of publication:Berlin,Heidelberg,New York,Tokyo
-
Publication date:1986
-
Size:11 Seiten, 29 Quellen
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
The contribution of E.B. Fleissner and A. Figl for today's cryptographyHorak, O.J. et al. | 1986
- 18
-
On the history of cryptography during WW2, and possible new directions for cryptographic researchTedrick, T. et al. | 1986
- 31
-
Efficient factoring based on partial informationRivest, R.L. / Shamir, A. et al. | 1986
- 35
-
A public-key cryptosystem based on shift register sequencesNiederreiter, H. et al. | 1986
- 40
-
A comment on Niederreiter's public key cryptosystemSmeets, B. et al. | 1986
- 43
-
Implementation study of public key cryptographic protection in an existing electronic mail and document handling systemVandevalle, J. / Govaerts, R. / Becker, W. de / Decroos, M. / Speybrouck, G. et al. | 1986
- 50
-
Cryptanalysis of the Dickson-schemeMueller, W.B. / Noebauer, R. et al. | 1986
- 62
-
Simultaneous security of bits in the discrete logPeralta, R. et al. | 1986
- 73
-
On public-key cryptosystems built using polynomial ringsPieprzyk, J.P. et al. | 1986
- 81
-
Is the data encryption standard a group.Kaliski, B.S. jun. / Rivest, R.L. / Sherman, A.T. et al. | 1986
- 96
-
Two new secret key cryptosystemsMeijer, H. / Akl, S. et al. | 1986
- 103
-
Cryptanalysis representation of nonlinearly filtered ML-sequencesSiegenthaler, T. et al. | 1986
- 111
-
Authorized writing for 'write-once' memoriesGodlewski, P. / Cohen, G.D. et al. | 1986
- 119
-
On functions of linear shift register sequencesHerlestam, T. et al. | 1986
- 130
-
On feedforward transforms and p-fold periodic p-arraysChen, D. / Dai, Z. et al. | 1986
- 135
-
Generalized mutiplexed sequencesLiu, M. / Wan, Z. et al. | 1986
- 142
-
A note on sequences generated by clock controlled shift registersSmeets, B. et al. | 1986
- 149
-
Using algorithmus as keys in stream ciphersWagner, N.R. / Putter, P.S. / Cain, M.R. et al. | 1986
- 156
-
On the linear complexity of combined shift register sequencesBrynielsson, L. et al. | 1986
- 161
-
Analysis of a nonlinear feedforward logic for binary sequence generatorsBernasconi, J. / Guenther, C.G. et al. | 1986
- 167
-
Linear complexity and random sequencesRueppel, R.A. et al. | 1986
- 191
-
Engineering secure information systemsDavies, D.W. / Price, W.L. et al. | 1986
- 200
-
The chipcard - an identification card with cryptographic protectionKrivachy, T. et al. | 1986
- 208
-
Encryption - needs, requirements and solutions in banking networksRimensberger, U. et al. | 1986
- 214
-
The role of encipherment services in distributed systemsJones, R.W. / Baxter, M.S. et al. | 1986
- 221
-
Modeling of encryption techniques for secrecy and privacy in multi-user networksAgnew, G.B. et al. | 1986
- 231
-
Full encryption in a personal computer systemBradey, R.L. / Graham, I.G. et al. | 1986
- 241
-
Showing credentials without identification signatures transferred between unconditionally unlinkable pseudonymsChaum, D. et al. | 1986
- 245
-
Networks without user observability - design optionsPfitzmann, A. / Waidner, M. et al. | 1986
- 254
-
The verifiability of two-party protocolsBock, R.V. / Otto, F. et al. | 1986
- 261
-
The practice of authenticationSimmons, G.J. et al. | 1986
- 273
-
Message protection by spread spectrum modulation in a packet voice radio linkKowatsch, M. / Eichinger, B.O. / Seifert, F.J. et al. | 1986