×
Some properties of this generator are described and an equivalent definition is derived, after which two attacks are developed to evaluate its security. The ...
Abstract. In this paper, we analyze the generalized self-shrinking gen- erator newly proposed in [8]. Some properties of this generator are de-.
This attack shows that the generalized self-shrinking generator can not be more secure than the self-shrinking generator, although much more computations may be ...
Nov 28, 2023 · Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400.
作者, Zhang, B; Wu, HJ; Feng, DG; Bao, F. 刊名, Information and communications security, proceedings. 出版日期, 2004. 卷号, 3269页码:388-400.
Abstract: In this paper, we revisit the variant of the self-shrinking generator(SSG) proposed by Chang et al. at ICISC 2006. This variant, which we call SSG-XOR ...
Missing: Generalized | Show results with:Generalized
Some properties of this generator are described and an equivalent definition is derived, after which two attacks are developed to evaluate its security. The ...
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS ...
Security analysis of the generalized self-shrinking generator. ICICS. 2004, LNCS 3269, Springer-Verlag, 2004: 388-400. [6] Dong Lihua, Hu Yupu. Study on the ...
The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their ...