On the Evolution of GGHN Cipher (original) (raw)

Algebraic attack on the Alternating Step (r, s) Generator

Mehdi Hassanzadeh

… Theory Proceedings (ISIT), …, 2010

View PDFchevron_right

A note on cyclic m-cycle systems of K r (m)

Hung-lin Fu

View PDFchevron_right

A Modern Advanced Hill Cipher Involving a Permuted Key and Modular Arithmetic Addition Operation

Aruna Varanasi (Ph.D.)

Journal of Global Research in Computer Science, 2011

View PDFchevron_right

{2, 3}-PERFECT M-Cycle Systems Are Equationally Defined for M = 5, 7, 8, 9, and 11 Only

F. Rania

Journal of Combinatorial Designs, 2004

View PDFchevron_right

A modern Advanced Hill cipher Involving a Pair of Keys, Modular Arithmetic Addition and Substitution

Aruna Varanasi (Ph.D.)

Journal of Global Research in Computer Science, 2011

View PDFchevron_right

Linear Congruential Generators Do Not Produce Random Sequences

Jeffrey Lagarias

25th Annual Symposium onFoundations of Computer Science, 1984., 1984

View PDFchevron_right

The Gaussian Sequence 3th Order Mod m

Francisco Regis Vieira Alves (Teacher Digital Influencer)

2024

View PDFchevron_right

On the non-randomness of modular arthmetic progressions: a solution to a problem by VI Arnold

Brigitte Vallée

View PDFchevron_right

Attacking the Pollard Generator

A. Ibeas

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

BBS generator using the function x2-2 (mod n)

Alberto Peinado

View PDFchevron_right

On the non-randomness of modular arithmetic progressions: a solution to a problem by V. I. Arnold

Brigitte Vallée

Discrete Mathematics & Theoretical Computer Science, 2006

View PDFchevron_right

A New Approach in Key Generation and Expansion in Rijndael Algorithm

Abdullah Rashed

The International Arab Journal of Information Technology, 2006

View PDFchevron_right

1-rotationally resolvable 4-cycle systems of 2Kv

Hung-lin Fu

Journal of Combinatorial Designs, 2002

View PDFchevron_right

Digitized Chaos for Pseudo-random Number Generation in Cryptography

Santina Rocchi

Studies in Computational Intelligence, 2011

View PDFchevron_right

(M,N)-Cycle Systems

Hung-lin Fu

Journal of Statistical Planning and Inference, 1998

View PDFchevron_right

Cryptographic Properties of Addition Modulo 2n

Akbar Mahmoodi Rishakani

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

A Modified Feistel Cipher involving a pair of key matrices,Supplemented with Modular Arithmetic Addition and Shuffling of the plaintext in each round of the iteration process

Dr. K. Anup Kumar

View PDFchevron_right

Contracted Integers and Solfeggio Sequences

Paul Martyn-Smith

View PDFchevron_right

Modular Transformations, Order-Chaos Transitions and Pseudo-Random Number Generation

ANTONIO BONELLI

International Journal of Modern Physics C

View PDFchevron_right

Colouring 4-cycle systems with equitably coloured blocks

Mario Gionfriddo

Discrete Mathematics, 2004

View PDFchevron_right

Generating units modulo an odd integer by addition and subtraction

Hendrik Lenstra

Acta Arithmetica, 1993

View PDFchevron_right

Cryptanalysis of the Quadratic Generator

Domingo Gomez-Perez

Lecture Notes in Computer Science, 2005

View PDFchevron_right

The modular n-queen problem II

Torleiv Klove

Discrete Mathematics, 1981

View PDFchevron_right

The k-Nacci Sequences in Some Special Modular Groups

Ömür Deveci

Algebra Colloquium, 2014

View PDFchevron_right

A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supported With Modular Arithmetic Addition

Ms.K. Shirisha

2013

View PDFchevron_right

Explorations of the Collatz Conjecture (mod m)

Micah Jackson

2014

View PDFchevron_right

A variant of Miller's formula and algorithm

Nadia Mrabet

2010

View PDFchevron_right

THe Chinese Remainder Theorem

gary knott

Civilized Software Technical reportr, 2023

View PDFchevron_right

Algebraic Structures and Cycling Test of Rijndael

Jean-jacques Quisquater

2002

View PDFchevron_right

The 3x+1 Problem as a String Rewriting System

Joseph Sinyor

View PDFchevron_right

Moufang Loops of Odd Orderp4q1…qn

Andrew Rajah

Journal of Algebra, 1996

View PDFchevron_right

On the 2k-step Jordan-Fibonacci sequence

Sait TAŞ

Advances in Difference Equations, 2017

View PDFchevron_right

A Proof of the Welch and Niho Conjectures on Cross-Correlations of Binary m-Sequences

Henk D L Hollmann

Finite Fields and Their Applications, 2001

View PDFchevron_right

An application of the O’Nan-Scott theorem to the group generated by the round functions of an AES-like cipher

Andrea Caranti

Designs, Codes and Cryptography, 2009

View PDFchevron_right

A Computational Introduction to Number Theory and Algebra (Version 2

prize doli

View PDFchevron_right