

Author: Joyner David
Publisher: Taylor & Francis Ltd
ISSN: 0161-1194
Source: Cryptologia, Vol.37, Iss.2, 2013-04, pp. : 175-183
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content






Algebraic feedback shift registers
By Klapper A. Xu J.
Theoretical Computer Science, Vol. 226, Iss. 1, 1999-09 ,pp. :


On Lindenmayerian algebraic sequences
By Honkala J.
Theoretical Computer Science, Vol. 183, Iss. 1, 1997-08 ,pp. :


Review of Algebraic Cryptanalysis
Cryptologia, Vol. 35, Iss. 1, 2011-01 ,pp. :