Author:
Lin Zhiqiang,Lin Dongdai,Pei Dingyi
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference19 articles.
1. Arnault, F., Berger, T.P.: F-FCSR: design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE. Lecture Notes in Computer Science, vol. 3557, pp. 83–97. Springer, New York (2005)
2. Arnault, F., Berger, T.P., Benjamin, P.: A Matrix Approach for FCSR Automata. Cryptogr. Commun. 3(2), 109–139 (2010)
3. Arnault, F., Berger, T.P., Lauradoux, C.: Update on F-FCSR Stream Cipher. ECRYPT-Network of Excellence in Cryptology (Call for stream Cipher Primitives-Phase 2 2006) (2006). [ http://www.ecrypt.eu.org/stream/ ]
4. Arnault, F., Berger, T.P., Lauradoux, C., Minier, M., Pousse, B.: A new approach for FCSRs. In: M.J.J. Jr., Rijmen, V., Safavi-Naini, R. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5867, pp 433–448. Springer, New York (2009)
5. Arnault, F., Berger, T.P., Minier, M., Pousse, B.: Revisiting LFSRs for cryptographic applications. IEEE Trans. Inf. Theory 57(12), 8095–8113 (2011)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cybersecurity Risks in Romanian Companies;Encyclopedia of Organizational Knowledge, Administration, and Technology;2021
2. Cyberaccounting for the Leaders of the Future;Advances in Business Strategy and Competitive Advantage;2020
3. Management Approach of Risk Analysis in Information Security;Cyber Warfare and Terrorism;2020
4. The International Experience in Security Risk Analysis Methods;Network Security and Its Impact on Business Strategy;2019
5. Proactive Information Security Strategy for a Secure Business Environment;Advances in Data Mining and Database Management;2019