Login / Signup
Security analysis of linearly filtered NLFSRs.
Mohammad Ali Orumiehchiha
Josef Pieprzyk
Ron Steinfeld
Harry Bartlett
Published in:
J. Math. Cryptol. (2013)
Keyphrases
</>
security analysis
public key
smart card
security requirements
security properties
high security
security model
image encryption
authentication protocol
encryption algorithm
user authentication
mutual authentication
proxy signature scheme
multiresolution
authentication scheme
access control
information systems