Skip to main content
Top

2013 | OriginalPaper | Chapter

18. Solutions

Author : Andreas Klein

Published in: Stream Ciphers

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Solutions to the exercises from the previous chapter.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
57.
go back to reference Coppersmith, D.: Finding a small root of a bivariate equation; factoring with high bits known. In: Maurer, U.M. (ed.) EUROCRYPT. LNCS, vol. 1070, pp. 178–189. Springer, Berlin (1996) Coppersmith, D.: Finding a small root of a bivariate equation; factoring with high bits known. In: Maurer, U.M. (ed.) EUROCRYPT. LNCS, vol. 1070, pp. 178–189. Springer, Berlin (1996)
61.
go back to reference Coudert, O., Berthet, C., Madre, J.C.: Verification of synchronous sequential machines based on symbolic execution. In: Automatic Verification Methods for Finite State Systems. LNCS, vol. 407, pp. 365–373. Springer, Berlin (1989) CrossRef Coudert, O., Berthet, C., Madre, J.C.: Verification of synchronous sequential machines based on symbolic execution. In: Automatic Verification Methods for Finite State Systems. LNCS, vol. 407, pp. 365–373. Springer, Berlin (1989) CrossRef
98.
go back to reference Gaines, H.F.: Cryptanalysis. Dover, New York (1956) Gaines, H.F.: Cryptanalysis. Dover, New York (1956)
157.
go back to reference Knuth, D.E.: The Art of Computer Programming, vol. 4. Generating All Tuples and Permutations. Addison-Wesley, Upper Saddle River (2005) Knuth, D.E.: The Art of Computer Programming, vol. 4. Generating All Tuples and Permutations. Addison-Wesley, Upper Saddle River (2005)
166.
go back to reference Krause, M.: BDD-based attacks of keystream generators. In: Knudson, L. (ed.) Advances in Cryptology—EUROCRYPT ’02. LNCS, vol. 1462, pp. 222–237. Springer, Berlin (2002) Krause, M.: BDD-based attacks of keystream generators. In: Knudson, L. (ed.) Advances in Cryptology—EUROCRYPT ’02. LNCS, vol. 1462, pp. 222–237. Springer, Berlin (2002)
188.
go back to reference Meier, W., Staffelbach, O.: The self-shrinking generator. In: Proceedings of EUROCRYPT ’94. LNCS, vol. 950, pp. 205–214 (1994) CrossRef Meier, W., Staffelbach, O.: The self-shrinking generator. In: Proceedings of EUROCRYPT ’94. LNCS, vol. 950, pp. 205–214 (1994) CrossRef
200.
go back to reference Odlyzko, A.M.: The rise and fall of the knapsack cryptosystem. In: Pomerance, C. (ed.) Cryptology and Computational Number Theory. Proceeding of Symposia in Applied Mathematics, vol. 42, pp. 75–88. American Mathematical Society, Providence (1990) CrossRef Odlyzko, A.M.: The rise and fall of the knapsack cryptosystem. In: Pomerance, C. (ed.) Cryptology and Computational Number Theory. Proceeding of Symposia in Applied Mathematics, vol. 42, pp. 75–88. American Mathematical Society, Providence (1990) CrossRef
212.
go back to reference Poe, E.A.: A Few Words on Secret Writing. Graham’s Magazine. July 1841 Poe, E.A.: A Few Words on Secret Writing. Graham’s Magazine. July 1841
243.
go back to reference Shamir, A., Zippel, R.E.: On the security of the Merkel-Hellman cryptographic scheme. IEEE Trans. Inf. Theory IT-26(3), 339–340 (1980) CrossRef Shamir, A., Zippel, R.E.: On the security of the Merkel-Hellman cryptographic scheme. IEEE Trans. Inf. Theory IT-26(3), 339–340 (1980) CrossRef
279.
go back to reference Wegner, P.: A technique for counting ones in a binary computer. Commun. ACM 3, 322 (1960) CrossRef Wegner, P.: A technique for counting ones in a binary computer. Commun. ACM 3, 322 (1960) CrossRef
Metadata
Title
Solutions
Author
Andreas Klein
Copyright Year
2013
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5079-4_18

Premium Partner