scientific article

From MaRDI portal
Publication:4004196

zbMath0784.94019MaRDI QIDQ4004196

No author found.

Publication date: 23 January 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (68)

Improving bounds for the number of correlation immune Boolean functionsAn attack on a recursive authentication protocol. A cautionary taleLinear complexity of the Naor-Reingold pseudo-random functionTwo secret sharing schemes based on Boolean operationsThe unicity distance: An upper bound on the probability of an eavesdropper successfully estimating the secret keyAn efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystemAn efficient multi-receipt mechanism for uncoercible anonymous electronic votingCombinatorial bounds and characterizations of splitting authentication codesHash function based on piecewise nonlinear chaotic mapThe use of mathematical linguistic methods in creating secret sharing threshold algorithmsImproving the high order nonlinearity lower bound for Boolean functions with given algebraic immunityOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesCombinational constructions of splitting authentication codes with perfect secrecyThe expected value of the joint linear complexity of periodic multisequencesConstruction of sequences with high nonlinear complexity from a generalization of the Hermitian function fieldNew bound for affine resolvable designs and its application to authentication codesFixed points of the subset sum pseudorandom number generatorsThe minimal polynomial of a sequence obtained from the componentwise linear transformation of a linear recurring sequenceA generalization of the formulas for intersection numbers of dual polar association schemes and their applicationsThe independence of two randomness properties of sequences over finite fieldsCartesian authentication codes from functions with optimal nonlinearity.Extended Games-Chan algorithm for the 2-adic complexity of FCSR-sequences.On weak keys and forgery attacks against polynomial-based MAC schemesA new key authentication scheme based on discrete logarithmsCryptographic protocols and votingAnzahl formulas of subspaces in symplectic spaces and their applicationsImproved low-computation partially blind signatures.Linear Span analysis of a set of periodic sequence generatorsAuthentication codes: An area where coding and cryptology meetSingular linear space and its applicationsOne-time pad as a nonlinear dynamical systemA new digital signature scheme based on chaotic mapsPreimage selective trapdoor function: how to repair an easy problemModelling nonlinear sequence generators in terms of linear cellular automataLinear algebra approach to secret sharing schemesOn nonlinear filter generatorsFast message authentication using efficient polynomial evaluationOn the linear complexity of Sidel'nikov sequences over nonprime fieldsMultisequences with almost perfect linear complexity profile and function fields over finite fieldsStrongly ideal secret sharing schemesSuccessive minima profile, lattice profile, and joint linear complexity profile of pseudorandom multisequencesA novel key management scheme for dynamic access control in a user hierarchyEfficient on-line electronic checksImprovement of Tseng et al.'s authenticated encryption scheme with message linkagesUse of chaotic dynamical systems in cryptographyLinear secret sharing schemes and rearrangements of access structuresAn efficient algorithm to generate binary sequences for cryptographic purposesPredicting nonlinear pseudorandom number generatorsGeneralized Joint Linear Complexity of Linear Recurring MultisequencesChaos synchronization for a class of discrete dynamical systems on the \(N\)-dimensional torusOn the linear complexities of two classes of quaternary sequences of even length with optimal autocorrelationBroadcast authentication for group communicationKey distribution patterns using Minkowski planesShrinking generators and statistical leakageNew generalized secret-sharing schemes with points on a hyperplane using a Wronskian matrixLinear connectivity problems in directed hypergraphsRandomness measures related to subset occurrenceOn the linear complexity profile of some new explicit inversive pseudorandom numbersReliable communication over partially authenticated networksHardware optimizations of stream cipher rabbitCounting functions and expected values for the lattice profile at \(n\)The minimal polynomial over \(\mathbb F_q\) of linear recurring sequence over \(\mathbb F_{q^m}\)The expectation and variance of the joint linear complexity of random periodic multisequencesOn the linear complexity profile of explicit nonlinear pseudorandom numbers.Further results on asymmetric authentication schemesMultireceiver authentication codes: Models, bounds, constructions, and extensionsLinear complexity, \(k\)-error linear complexity, and the discrete Fourier transformCounting functions and expected values for the \(k\)-error linear complexity




This page was built for publication: