The latter analysis could help to disentangle what kind of automaton rule is used in the randomization process and therefore it could be useful in cryptanalysis.
Improvement and analysis of a pseudo random bit generator by means of cellular automata
The time series of the row sums of the matrix HN are also analyzed within the multifractal formalism because they could be a possible useful feature for cryptanalysis of these types of PRNGs.
Improvement and analysis of a pseudo random bit generator by means of cellular automata
The intrinsic multifractal properties of the sequence matrix in the two versions of the generator are discussed having in mind their possible usage in cryptanalysis.
Improvement and analysis of a pseudo random bit generator by means of cellular automata
PRNGs to existing ones, and a cryptanalysis of our generator will be proposed.
On the design of a family of CI pseudo-random number generators
B. Goldburg, S. Sridharan, E. Dawson, Design and cryptanalysis of transform-based analog speech scramblers.
Randomization Using Quasigroups, Hadamard and Number Theoretic Transforms
Fast cryptanalysis of the Matsumoto-Imai public key scheme.
Null Polynomials modulo m
Blackburn, Carlos Cid, Ciaran Mullan, Cryptanalysis of the M ST3 cryptosystem, J.
Group theory in cryptography
Simon Blackburn, Sean Murphy and Jacques Stern, The cryptanalysis of a public key implementation of Finite Group Mappings, J.
Group theory in cryptography
Arkadius Kalka, Mina Teicher and Boaz Tsaban, ‘Cryptanalysis of the Algebraic Eraser and short expressions of permutations as products’, preprint.
Group theory in cryptography
Aviad Kipnis and Adi Shamir, Cryptanalysis of the HFE public key cryptosystem, in Advances in Cryptology – CRYPTO ’99 (M.
Group theory in cryptography
Dima Ruinskiy, Adi Shamir and Boaz Tsaban, Length-based cryptanalysis: The case of Thompson’s Group, J.
Group theory in cryptography
Vladimir Shpilrain, Cryptanalysis of Stickel’s key exchange scheme, in Computer Science – Theory and Applications (E.A.
Group theory in cryptography
Daemen J., "Cipher and hash function design strategies based on linear and differential cryptanalysis," Doctoral Dissertation, March 1995, K.U.
One software tool for testing square s-boxes
Algebraic Cryptanalysis of McEliece Variants with Compact Keys.
On the decoding of quasi-BCH codes
Ushakov, Length based attack and braid groups: cryptanalysis of Anshel-Anshel-Goldfeld key exchange protocol, PKS 2007, Lect.
Some Remarks on the Braided Thompson Group BV
***