Sciweavers

SACRYPT
2000
Springer
107views Cryptology» more  SACRYPT 2000»
15 years 7 months ago
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
It has recently been shown that when m > 1 2 n - 1, the nonlinearity Nf of an mth-order correlation immune function f with n variables satisfies the condition of Nf 2n-1 - 2m ,...
Yuliang Zheng, Xian-Mo Zhang
ANNES
1995
15 years 7 months ago
Selection of Attributes for Modeling Bach Chorales by a Genetic Algorithm
Ageneticalgorithmselectedcombinationsofattributesfor amachinelearningsystem.Thealgorithmused90Bach choralemelodiestotrainmodelsandrandomlyselectedsets of10choralesforevaluation.Co...
Mark A. Hall
SACRYPT
2000
Springer
15 years 7 months ago
LILI Keystream Generator
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently ...
Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, W...
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
15 years 7 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer