Filters








7 Hits in 7.5 sec

Page 2945 of Mathematical Reviews Vol. , Issue 99d [page]

1991 Mathematical Reviews  
(YU-SAOS-AME; Belgrade) Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach.  ...  Summary: “A recently proposed scheme for key stream generators based on the programmable cellular automata and a read only memory is considered.  ... 

Page 1449 of Mathematical Reviews Vol. , Issue 99b [page]

1991 Mathematical Reviews  
Mihaljevi¢, Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach (250-262); Alexander A. Nechaev [A. A. Nechaev] and Alexey S. Kuzmin [A.  ...  The bounds are in terms of the dimension n and the coding gain y of L, and are obtained based on a decoding algorithm which is an improved version of Kannan’s  ... 

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The user thereof uses the information at its sole risk and liability. References  ...  Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  Note that the secret key sk = {x 0 , . . . , x m/t } can be generated with a good pseudorandom generator using a single seed sk .  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Page 2372 of Mathematical Reviews Vol. 31, Issue Index [page]

Mathematical Reviews  
Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach.  ...  The security of public key cryptosystems based on integer factorization. (English summary) 99j:94056 Miiller, Volker?  ... 

Page 1164 of Mathematical Reviews Vol. 31, Issue Index [page]

Mathematical Reviews  
(Summary) 99d:94034 94B05 — Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach.  ...  .; Nollet, Scott) Degrees of generators of ideals defining curves in projective space. (English summary) Comm. Algebra 26 (1998), no. 4, 1209-1231.  ... 

SECURWARE 2015 Committee SECURWARE Advisory Chairs

Rainer Falk, Hans-Joachim Hof, William Dougherty, Secern Consulting -Charlotte, Hans-Joachim Usa, Hof, Peter Müller, Syed Naqvi, Juha Rőning, Mariusz Jakubowski, Microsoft Research, William Dougherty (+163 others)
unpublished
Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs.  ...  a series of events covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related  ...  ACKNOWLEDGMENT The authors acknowledge the financial support given to this work, under the project "Security Technologies for Mobile Environments -TSAM", granted by the  ... 
fatcat:xebt7atkmzcy5mu3yabwgyczye

Dagstuhl Reports, Volume 6, Issue 1, January 2016, Complete Issue [article]

2016
However, there is a general lack of incentives for high-quality research exposition of security and cryptography research.  ...  We discussed the specific case of the Dual-EC DRBG, where the construction of the random number generator allows an entity who generates the input parameters adversarially to recover the state and future  ...  In CRYPTO'05, Bellare et al. proved O( q 2 /2 n ) bound for the PRF (pseudorandom function) security of the CBC-MAC based on an n-bit random permutation Π, provided < 2 n/3 .  ... 
doi:10.4230/dagrep.6.1 fatcat:vq74ezrwifbkhex6twvtdzbpaa