Sciweavers

230 search results - page 6 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
AMC
2004
97views more  AMC 2004»
13 years 7 months ago
Analysis of three-dimensional grids: the eight-point cube
It is widely believed that quadratic coefficients cannot be estimated from eight data in cubical array. This paper illustrates the estimation of those coefficients by means of by ...
G. L. Silver
GECCO
2000
Springer
104views Optimization» more  GECCO 2000»
13 years 11 months ago
Quadratic Bloat in Genetic Programming
In earlier work we predicted program size would grow in the limit at a quadratic rate and up to fty generations we measured bloat O(generations1:2;1:5). On two simple benchmarks w...
William B. Langdon
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 1 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
CCS
2006
ACM
13 years 11 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
ASIACRYPT
2007
Springer
14 years 1 months ago
Cryptanalysis of Grindahl
Due to recent breakthroughs in hash functions cryptanalysis, some new hash schemes have been proposed. GRINDAHL is a novel hash function, designed by Knudsen, Rechberger and Thomse...
Thomas Peyrin