Narrow your search

Library

KU Leuven (5)

UAntwerpen (4)

UGent (4)

KBR (3)

UCLouvain (3)

ULiège (3)

ULB (2)

Arteveldehogeschool (1)

Hogeschool Gent (1)

Hogeschool West-Vlaanderen (1)

More...

Resource type

book (6)


Language

English (6)


Year
From To Submit

1985 (6)

Listing 1 - 6 of 6
Sort by
Basics of communications and coding
Author:
ISBN: 9780198531944 019853194X Year: 1985 Publisher: Oxford: Clarendon,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Advances in cryptology : proceedings of CRYPTO 84
Authors: --- ---
ISBN: 3540156585 0387156585 3540395687 9783540156581 Year: 1985 Volume: 196 Publisher: Berlin Heidelberg New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2 steps). An important open problem was to output even two bits on each multiplication in a cryptographically secure way. This problem was stated by Blum, Blum & Shub [3] in the context of their z2 mod N generator. They further ask: how many bits can be o- put per multiplication, maintaining cryptographic security? In this paper we state a simple condition, the XOR-Condition and show that any generator satisfying this condition can output logn bits on each multiplication. We show that the XOR-Condition is satisfied by the lop least significant bits of the z2-mod N generator. The security of the z2 mod N generator was based on Quadratic Residu- ity [3]. This generator is an example of a Trapdoor Generator [13], and its trapdoor properties have been used in protocol design. We strengthen the security of this gene- tor by proving it as hard as factoring.

Computation theory : fifth symposium, Zaborow, December 3-8, 1984
Author:
ISBN: 3540160663 0387160663 3540397485 Year: 1985 Volume: vol 208 Publisher: Berlin Heidelberg New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Digital and analog communication systems
Author:
ISBN: 0471063029 0471030902 9780471030904 Year: 1985 Publisher: New York John Wiley & Sons

Loading...
Export citation

Choose an application

Bookmark

Abstract

TAPSOFT : proceedings of the international joint conference on theory and practice of software development, Berlin, March 25-29, 1985
Authors: --- ---
ISBN: 3540151982 0387151982 3540151990 0387151990 3540393021 3540393072 9783540151982 9783540151999 Year: 1985 Volume: 185-186 Publisher: Berlin Heidelberg New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Programming --- Computer software --- Logiciels --- Development --- Congresses --- Développement --- Congrès --- 681.3*D22 --- 681.3*E1 --- 681.3*F --- 681.3*F3 --- 681.3*F4 --- Tools and techniques: decision tables; flow charts; modules and interfaces; programmer workbench; software libraries; structured programming; top-down programming; user interfaces (Software engineering) --- Data structures: arrays; graphs; lists; tables; trees --- Theory of computation --- Logics and meanings of programs (Theory of computation) --- Mathematical logic and formal languages (Theory of computation) --- 681.3*D0 --- 681.3*D2 --- Computerwetenschap--?*D0 --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- 681.3*F4 Mathematical logic and formal languages (Theory of computation) --- 681.3*F3 Logics and meanings of programs (Theory of computation) --- 681.3*F Theory of computation --- 681.3*E1 Data structures: arrays; graphs; lists; tables; trees --- 681.3*D22 Tools and techniques: decision tables; flow charts; modules and interfaces; programmer workbench; software libraries; structured programming; top-down programming; user interfaces (Software engineering) --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Développement --- Congrès --- Software engineering. --- Computer science. --- Logic design. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- Programming Languages, Compilers, Interpreters. --- Logics and Meanings of Programs. --- Information theory. --- Combinatorics. --- Theory of Computation. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Informatics --- Science --- Computer software engineering --- Engineering --- Combinatorics --- Algebra --- Mathematical analysis --- Communication theory --- Communication --- Cybernetics --- Congresses.

Listing 1 - 6 of 6
Sort by