Deciphering a linear congruential encryption
From MaRDI portal
Publication:3705347
Recommendations
- Inferring sequences produced by a linear congruential generator missing low-order bits
- Inferring sequences produced by pseudo-random number generators
- Attacking the linear congruential generator on elliptic curves via lattice techniques
- Cryptanalysis of the Quadratic Generator
- Image encryption by using a specific adaptation of Lehmer’s algorithm
Cited in
(14)- Practical seed-recovery of fast cryptographic pseudo-random number generators
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Predicting truncated multiple recursive generators with unknown parameters
- On pseudorandom numbers from multivariate polynomial systems
- Predicting masked linear pseudorandom number generators over finite fields
- A constraint-based approach to enigma 1225
- scientific article; zbMATH DE number 58014 (Why is no real title available?)
- Survey on hardware implementation of random number generators on FPGA: theory and experimental analyses
- Inferring sequences produced by a linear congruential generator missing low-order bits
- Solving XOR Plaintext Strings with the Viterbi Algorithm
- Attacking the linear congruential generator on elliptic curves via lattice techniques
- An improved method for predicting truncated multiple recursive generators with unknown parameters
- Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits
- Predicting nonlinear pseudorandom number generators
This page was built for publication: Deciphering a linear congruential encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3705347)