Abstract. Security of cryptographic symmetric primitives is studied in this thesis. Pseudorandomness characteristics of cryptographic sequences are analyzed, resulting in new methods for constructing sequences with high linear complexity. Connections between nonlinear complexity and other cryptographic criteria are also established, whereas a new recursive algorithm for efficiently computing the minimal feedback shift register which generates a given sequence is provided. Furthermore, security is-sues of cryptographic Boolean functions that are used in cryptographic systems as components of sequence generators are studied; on this direc-tion, new efficient formulas for determining best quadratic approxima-tions of several classes of Boolean...
Pseudorandom binary sequences are required in stream ciphers and other applications of modern commun...
In this thesis, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generat...
Information and communication systems (ICSs) must comply with increasingly stringent requirements to...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
This paper is an introduction to the use of mathematics in two important aspects of electronic commu...
AbstractA large Linear Complexity (LC) is a fundamental requirement for a binary sequence to be used...
AbstractIn this work, a simple constructive method is developed for enlarging known families of filt...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
The analysis of problems associated with theoretical and practical substantiation of principles of c...
AbstractIn this work the use of nonlinear filtering functions applied to Linear Feedback Shift Regis...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Information and communication systems (ICSs) must comply with increasingly stringent requirements to...
Information and communication systems (ICSs) must comply with increasingly stringent requirements to...
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptograp...
In this paper, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generato...
Pseudorandom binary sequences are required in stream ciphers and other applications of modern commun...
In this thesis, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generat...
Information and communication systems (ICSs) must comply with increasingly stringent requirements to...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
This paper is an introduction to the use of mathematics in two important aspects of electronic commu...
AbstractA large Linear Complexity (LC) is a fundamental requirement for a binary sequence to be used...
AbstractIn this work, a simple constructive method is developed for enlarging known families of filt...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
The analysis of problems associated with theoretical and practical substantiation of principles of c...
AbstractIn this work the use of nonlinear filtering functions applied to Linear Feedback Shift Regis...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Information and communication systems (ICSs) must comply with increasingly stringent requirements to...
Information and communication systems (ICSs) must comply with increasingly stringent requirements to...
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptograp...
In this paper, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generato...
Pseudorandom binary sequences are required in stream ciphers and other applications of modern commun...
In this thesis, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generat...
Information and communication systems (ICSs) must comply with increasingly stringent requirements to...