Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 12 of 12.

Add to Quick Collection   All 12 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2016
Language: eng
Resource Type: Thesis PhD
Identifier: http://hdl.handle.net/1959.14/1163992
Description: Empirical thesis.
Full Text: Full Text
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/319540
Description: The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In r ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: Thesis PhD
Identifier: http://hdl.handle.net/1959.14/1138411
Description: "December 2013"
Full Text: Full Text
Date: 2013
Language: eng
Resource Type: Thesis PhD
Identifier: http://hdl.handle.net/1959.14/307348
Description: "A thesis submitted to Macquarie University for the degree of Doctor of Philosophy, Department of Computing, Faculty of Science".
Full Text: Full Text
Date: 2013
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/221905
Description: We study the security of the linear generator over a finite field. It is shown that the seed of a linear generator can be deduced from partial information of a short sequence of consecutive outputs of ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/178617
Description: Edwards curves are an alternate model for elliptic curves, which have attracted notice in cryptography. We give exact formulas for the number of Fq-isomorphism classes of Edwards curves and twisted Ed ... More
Reviewed: Reviewed
Date: 2005
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146590
Description: We give a relation between the linear complexity over the integers and over the residue rings modulo m of a bounded integer sequence. This relation can be used to obtain a variety of new results for s ... More
Reviewed: Reviewed
Date: 2005
Language: eng
Resource Type: Thesis PhD
Identifier: mq:3
Description: Title from screen page; viewed 10 Oct 2005.
Full Text: Full Text
Date: 2003
Subject Keyword: Computer security | Cryptography
Language: eng
Resource Type: book
Identifier: http://hdl.handle.net/1959.14/116667
Description: This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security ... More
Date: 2002
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1153369
Description: Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a "hidden" element α of a finite field (double-struck F sign)p = {0, ..., p-1} of p elements from rather short st ... More
Reviewed: Reviewed
  • First
  • Previous
  • 1
  • Next
  • Last