Publication:4737247
From MaRDI portal
zbMath1055.94018MaRDI QIDQ4737247
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320222.htm
Applications of graph theory (05C90) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Related Items
Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath, Cryptanalysis of three mutually clock-controlled stop/go shift registers, Improved multi-pass fast correlation attacks with applications, Algebraic Attacks Using Binary Decision Diagrams, Cryptographic properties of the hidden weighted bit function, Attacking Bivium Using SAT Solvers, Optimising Gröbner bases on Bivium, Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator, Concatenations of the hidden weighted bit function and their cryptographic properties, De Bruijn sequences and complexity of symmetric functions, Generalization of the Self-Shrinking Generator in the Galois Field, Practical cryptanalysis of Bluetooth encryption with condition masking, How to Strengthen Pseudo-random Generators by Using Compression, Self-shrinking chaotic stream ciphers, Extended BDD-Based Cryptanalysis of Keystream Generators, A very simple function that requires exponential size nondeterministic graph-driven read-once branching programs, Improving OBDD attacks against stream ciphers, Cryptanalysis of an E0-like combiner with memory, Complexity Theoretical Results on Nondeterministic Graph-driven Read-Once Branching Programs, An algebraic attack to the Bluetooth stream cipher \textsc{E0}