×

Found 40 Documents (Results 1–40)

Computing the rank profile matrix. (English) Zbl 1345.65019

Proceedings of the 40th international symposium on symbolic and algebraic computation, ISSAC 2015, Bath, UK, July 6–9, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3435-8). 149-156 (2015).
MSC:  65F05 68W30
PDFBibTeX XMLCite
Full Text: DOI arXiv

Simultaneous computation of the row and column rank profiles. (English) Zbl 1360.65122

Kauers, Manuel (ed.), Proceedings of the 38th international symposium on symbolic and algebraic computation, ISSAC 2013, Boston, MA, USA, June 26–29, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2059-7). 181-188 (2013).
MSC:  65F30 15A03 65Y20
PDFBibTeX XMLCite
Full Text: DOI arXiv

Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks. (English) Zbl 1166.94302

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 201-215 (2008).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

On the security of the LILI family of stream ciphers against algebraic attacks. (English) Zbl 1213.94076

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 11-28 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Algebraic attacks on clock-controlled cascade ciphers. (English) Zbl 1175.94100

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 32-47 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attacks on clock-controlled stream ciphers. (English) Zbl 1176.94029

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 1-16 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software