Stream ciphers are private key cryptosystems used for security in communication and data transmission systems. Because they are used to encrypt streams of data, it is necessary for stream ciphers to use primitives that are easy to implement and fast to operate. LFSRs and the recently invented FCSRs are two such primitives, which give rise to certain security measures for the cryptographic strength of sequences, which we refer to as complexity measures henceforth following the convention. The linear (resp. N-adic) complexity of a sequence is the length of the shortest LFSR (resp. FCSR) that can generate the sequence. Due to the availability of shift register synthesis algorithms, sequences used for cryptographic purposes should have high val...
AbstractIn cryptology, complexity measures for sequences of elements of a finite field, such as the ...
We study the stability of m-sequences in the sense of determining the number of errors needed for de...
Some cryptographical applications use pseudorandom sequences and require that the sequences are secu...
Pseudo-random sequences are a crucial component of cryptography, particularly in stream cipher desig...
Complexity measures for sequences over finite fields, such as the linear complexity and the k-error ...
AbstractComplexity measures for sequences of elements of a finite field play an important role in cr...
AbstractComplexity measures for sequences over finite fields, such as the linear complexity and the ...
Some cryptographical applications use pseudorandom sequences and require that the sequences are secu...
AbstractComplexity measures for keystream sequences over Z/(N) play a crucial role in designing good...
Several fast algorithms for the determination of the linear complexity of $d$-periodic sequences ove...
This thesis proposes various novel approaches for studying the k-error linear complexity distributio...
AbstractThis paper studies the stability of the linear complexity of l-sequences. Let s̲ be an l-seq...
The concept of linear complexity is important in cryptography, and in particular in the study of str...
An efficient algorithm is presented for computing the k-error linear complexity of a binary sequence...
AbstractBinary sequences generated by feedback shift registers with carry operation (FCSR) share man...
AbstractIn cryptology, complexity measures for sequences of elements of a finite field, such as the ...
We study the stability of m-sequences in the sense of determining the number of errors needed for de...
Some cryptographical applications use pseudorandom sequences and require that the sequences are secu...
Pseudo-random sequences are a crucial component of cryptography, particularly in stream cipher desig...
Complexity measures for sequences over finite fields, such as the linear complexity and the k-error ...
AbstractComplexity measures for sequences of elements of a finite field play an important role in cr...
AbstractComplexity measures for sequences over finite fields, such as the linear complexity and the ...
Some cryptographical applications use pseudorandom sequences and require that the sequences are secu...
AbstractComplexity measures for keystream sequences over Z/(N) play a crucial role in designing good...
Several fast algorithms for the determination of the linear complexity of $d$-periodic sequences ove...
This thesis proposes various novel approaches for studying the k-error linear complexity distributio...
AbstractThis paper studies the stability of the linear complexity of l-sequences. Let s̲ be an l-seq...
The concept of linear complexity is important in cryptography, and in particular in the study of str...
An efficient algorithm is presented for computing the k-error linear complexity of a binary sequence...
AbstractBinary sequences generated by feedback shift registers with carry operation (FCSR) share man...
AbstractIn cryptology, complexity measures for sequences of elements of a finite field, such as the ...
We study the stability of m-sequences in the sense of determining the number of errors needed for de...
Some cryptographical applications use pseudorandom sequences and require that the sequences are secu...