Introduction and Preliminaries
- 28 January 2021
- book chapter
- other
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Bent Boolean FunctionsPublished by Elsevier BV ,2017
- Algebraic Attacks and Decomposition of Boolean FunctionsLecture Notes in Computer Science, 2004
- Algebraic Attacks on Stream Ciphers with Linear FeedbackLecture Notes in Computer Science, 2003
- The Filter-Combiner Model for Memoryless Synchronous Stream CiphersLecture Notes in Computer Science, 2002
- LFSR-based Hashing and AuthenticationPublished by Springer Science and Business Media LLC ,2001
- Introduction to Finite Fields and their ApplicationsPublished by Cambridge University Press (CUP) ,1994
- Propagation Characteristics of Boolean FunctionsLecture Notes in Computer Science, 1991
- The Stability Theory of Stream CiphersLecture Notes in Computer Science, 1991
- A Simple Unpredictable Pseudo-Random Number GeneratorSIAM Journal on Computing, 1986
- Analysis and Design of Stream CiphersPublished by Springer Science and Business Media LLC ,1986