ARTÍCULO
TITULO

Cryptographic Properties of the Welch-Gong Transformation Sequence Generators

Gong    
G. Youssef    
A. M.    

Resumen

No disponible

 Artículos similares

       
 
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung    
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ... ver más
Revista: Algorithms

 
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev     Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u... ver más

 
La Zakaria, Endah Yuliani and Asmiati Asmiati    
Cryptography is the science and study of protecting data in computer and communication systems from unauthorized disclosure and modification. An ordinary difference equation (a map) can be used in encryption?decryption algorithms. In particular, the Arno... ver más
Revista: Algorithms

 
Gleb Isaev     Pág. 18 - 24
The denition of the propagation criterion of Boolean functions was introduced by Bart Preneel and co-authors. This concept represent a set of vectors, for which the corresponding derivatives of a Boolean function are balanced.  I... ver más

 
Barry Fagin    
Previous work established the set of square-free integers n with at least one factorization ??=??¯??¯ n = p ¯ q ¯ for which ??¯ p ¯ and ??¯ q ¯ are valid RSA keys, whether they are prime or composite. These integers are exactly those with the property... ver más
Revista: Information