×

Found 296 Documents (Results 1–100)

On some information geometric approaches to cyber security. (English) Zbl 1375.94082

Daras, Nicholas J. (ed.) et al., Operations research, engineering, and cyber security. Trends in applied mathematics and technology. Based on the presentations at the conference, Nea Peramos, Greece, May 2015. Cham: Springer (ISBN 978-3-319-51498-7/hbk; 978-3-319-51500-7/ebook). Springer Optimization and Its Applications 113, 167-197 (2017).
Full Text: DOI

The iterated random permutation problem with applications to cascade encryption. (English) Zbl 1375.94151

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 351-367 (2015).
MSC:  94A60 94A55
Full Text: DOI

Efficient pseudorandom functions via on-the-fly adaptation. (English) Zbl 1375.94092

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 329-350 (2015).
MSC:  94A55
Full Text: DOI

The hybrid spectral test: a unifying concept. (English) Zbl 1362.11072

Kritzer, Peter (ed.) et al., Uniform distribution and quasi-Monte Carlo methods. Discrepancy, integration and applications. Based on invited talks of the workspop, Linz, Austria, October 14–18, 2013. Berlin: De Gruyter (ISBN 978-3-11-031789-3/hbk; 978-3-11-031793-0/ebook). Radon Series on Computational and Applied Mathematics 15, 127-145 (2014).

On the lattice structure of inversive PRNG via the additive order. (English) Zbl 1355.94032

Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 212-219 (2014).
MSC:  94A55
Full Text: DOI

Independence test of chaotic sequences. (English) Zbl 1352.37154

Grácio, Clara (ed.) et al., Nonlinear maps and their applications. Selected contributions from the 3rd international workshop on nonlinear maps and their applications, NOMA 2011, Évora, Portugal, September 15–16, 2011. New York, NY: Springer (ISBN 978-1-4614-9160-6/hbk; 978-1-4614-9161-3/ebook). Springer Proceedings in Mathematics & Statistics 57, 95-108 (2014).
Full Text: DOI

Cryptographically strong de Bruijn sequences with large periods. (English) Zbl 1327.94022

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 104-118 (2013).
MSC:  94A55 94A60
Full Text: DOI

New sequences of period \(p^n\) and \(p^n+1\) via projective linear groups. (English) Zbl 1311.94063

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 311-330 (2013).
MSC:  94A55 65C10 11K45
Full Text: DOI

Linear complexity of binary sequences derived from polynomial quotients. (English) Zbl 1304.94024

Helleseth, Tor (ed.) et al., Sequences and their applications – SETA 2012. 7th international conference, Waterloo, ON, Canada, June 4–8, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30614-3/pbk). Lecture Notes in Computer Science 7280, 181-189 (2012).
MSC:  94A55 94A60 11T71
Full Text: DOI

Inferring sequences produced by nonlinear pseudorandom number generators using Coppersmith’s methods. (English) Zbl 1291.11137

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 609-626 (2012).
MSC:  11T71 94A55 11Y16
Full Text: DOI

A family of binary threshold sequences constructed by using the multiplicative inverse. (English) Zbl 1295.94004

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 95-104 (2011).
MSC:  94A55 11K45 94A60
Full Text: DOI

Filter Results by …

Access

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software