Author of the publication

Large Primes in Stream Cipher Cryptography.

, , and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 194-205. Springer, (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complete Tests in Algorithm-Based Fault-Tolerant Matrix Operations on Processor Arrays., , and . DFT, page 255-262. IEEE Computer Society, (1993)An application-specific array architecture for feedforward with backpropagation ANNs., , and . ASAP, page 333-344. IEEE, (1993)Private-Key Algebraic-Coded Cryptosystems., and . CRYPTO, volume 263 of Lecture Notes in Computer Science, page 35-48. Springer, (1986)Berger Check Prediction for Array Multipliers and Array Dividers., , and . IEEE Trans. Computers, 42 (7): 892-896 (1993)Encryption, Electronic Signatures and Security in Computer Communications.. ICCCN, IEEE Computer Society, (1997)Joint Encryption and Error Correction Schemes.. ISCA, page 240-241. ACM, (1984)A class of A(N + C) codes and its properties., and . IEEE Symposium on Computer Arithmetic, page 293-294. IEEE, (1985)Arithmetic of finite fields.. IEEE Symposium on Computer Arithmetic, page 1-5. IEEE Computer Society, (1981)Correction to "New double-byte error-correcting codes for memory systems"., , and . IEEE Trans. Inf. Theory, 45 (6): 2209 (1999)On the Linear Consistency Test (LCT) in Cryptanalysis with Applications., , and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 164-174. Springer, (1989)