Tài liệu tham khảo |
Loại |
Chi tiết |
[6] V Anashin, A Khrennikov, Applied Algebraic Dynamics. De Gruyter Expositions in Mathematics, vol. 49 (Walter de Gruyter, Berlin, 2009) |
Sách, tạp chí |
Tiêu đề: |
Applied Algebraic Dynamics. De Gruyter Expositions in Mathematics |
|
[7] A Klimov, A Shamir, A new class of invertible mappings, in Workshop on Cryptographic Hardware and Embedded Systems 2002. Lecture Notes in Computer Science, vol. 2523, 2003, pp. 470–483 |
Sách, tạp chí |
Tiêu đề: |
Workshop on Cryptographic Hardware and Embedded Systems 2002 |
|
[8] A Klimov, A Shamir, Cryptographic applications of T-functions, in Selected Areas in Cryptography (SAC) 2003. Lecture Notes in Computer Science, vol. 3006, 2004, pp. 248–261 |
Sách, tạp chí |
Tiêu đề: |
Selected Areas in Cryptography (SAC) 2003 |
|
[9] A Klimov, A Shamir, New cryptographic primitives based on multiword T-functions, in Fast Software Encryption 2004. Lecture Notes in Computer Science, vol. 3017, 2004, pp. 1–15 |
Sách, tạp chí |
Tiêu đề: |
Fast Software Encryption 2004 |
|
[10] A Klimov, A Shamir, New applications of T-functions in block ciphers and hash functions, in Fast Software Encryption 2005. Lecture Notes in Computer Science, vol. 3557, 2005, pp. 18–31 |
Sách, tạp chí |
Tiêu đề: |
Fast Software Encryption 2005 |
|
[12] G Marsaglia, A current view of random number generators. In Computer Science and Statistics: The Interface (Elsevier Science, 1985) |
Sách, tạp chí |
Tiêu đề: |
Computer Science and Statistics: The Interface |
|
[16] A Menezes, P van Oorschot, S Vanstone, Handbook of Applied Cryptography (CRC Press, 1996) |
Sách, tạp chí |
Tiêu đề: |
Handbook of Applied Cryptography |
|
[18] N Koblitz, A Course in Number Theory and Cryptography, 2nd edn. p. 38, Proposition II.1.8 (Springer, Graduate Text in Mathematics 114, 1994), ISBN-13: 978-0387942933 |
Sách, tạp chí |
Tiêu đề: |
A Course in Number Theory and Cryptography |
|
[19] J Arndt, Matters Computational: Ideas, Algorithms, Source Code (Springer, 2010), ISBN: 3642147631 |
Sách, tạp chí |
Tiêu đề: |
Matters Computational: Ideas, Algorithms, Source Code |
|
[4] V Anashin, Pseudorandom number generation by p-adic ergodic transformations. arXiv: Cryptography and Security, 2004.http://arxiv.org/abs/cs/0401030/ |
Link |
|
[5] V Anashin, Wreath products in stream cipher design. arXiv: Cryptography and Security, 2006. http://arxiv.org/abs/cs/0602012/ |
Link |
|
[17] B Morris, P Rogaway, T Stegers, How to encipher messages on a small domain. Advances in Cryptology. CRYPTO 2009.http://www.cs.ucdavis.edu/~rogaway/papers/thorp.pdf |
Link |
|
[1] L Hars, G Petruska, Pseudorandom recursions—small and fast pseudorandom number generators for embedded applications. EURASIP J. Embed. Syst. 2007, Article ID 98417, 13 (2007).doi:10.1155/2007/98417 |
Khác |
|
[2] V Anashin, Uniformly distributed sequences of p-adic integers. Math. Notes 55, 109–133 (1994) |
Khác |
|
[3] V Anashin, Uniformly distributed sequences of p-adic integers, II. Discrete Math. Appl. 12, 527–590 (2002) |
Khác |
|
[11] A Klimov, Applications of T-functions in cryptography. Thesis for the degree of Ph.D., Weizmann Institute of Science, 2005 |
Khác |
|
[13] U Maurer, A universal statistical test for random bit generators. J. Cryptogr. 5(2), 89–105 (1992) |
Khác |
|