Linear-feedback shift register

Results: 124



#Item
31IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 4, APRILCode-Division Multiplexing of a Sensor Channel: A Software Implementation

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 4, APRILCode-Division Multiplexing of a Sensor Channel: A Software Implementation

Add to Reading List

Source URL: sensor.cs.washington.edu

Language: English - Date: 2012-09-14 16:56:22
321 The Turing Stream Cipher November 30, 2002  Turing: a fast stream cipher

1 The Turing Stream Cipher November 30, 2002 Turing: a fast stream cipher

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-17 00:48:29
33Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1  University of California, Berkeley

Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1 University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
34State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1  Information Security Institute,

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 00:26:26
35Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ;  Abstract. RAKAPOSHI is a hardware oriented

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
36Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon National Security Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea {dlee,jaeheon,jinhon

Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon National Security Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea {dlee,jaeheon,jinhon

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-06 19:36:50
37MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-04-08 23:59:34
38xxx Algorithm Specification

xxx Algorithm Specification

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:54
39Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙

Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 09:15:34
40A PRNG specialized in double precision floating point numbers using an affine transition Mutsuo Saito and Makoto Matsumoto  Abstract We propose a pseudorandom number generator specialized to

A PRNG specialized in double precision floating point numbers using an affine transition Mutsuo Saito and Makoto Matsumoto Abstract We propose a pseudorandom number generator specialized to

Add to Reading List

Source URL: www.math.sci.hiroshima-u.ac.jp

Language: English - Date: 2012-03-16 04:07:31