Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recovering decimation-based cryptographic sequences by means of linear CAs., and . CoRR, (2018)SPC Product Codes over the Erasure Channel., and . ICMCTA, volume 3 of CIM Series in Mathematical Sciences, page 87-95. Springer, (2014)Randomness study of the concatenation of generalized sequences., , , and . Log. J. IGPL, 30 (6): 993-1004 (2022)The t-Modified Self-Shrinking Generator, and . ICCS (1), volume 10860 of Lecture Notes in Computer Science, page 653-663. Springer, (2018)Performance of the Cryptanalysis over the Shrinking Generator., and . CISIS-ICEUTE, volume 369 of Advances in Intelligent Systems and Computing, page 111-121. Springer, (2015)Unrestricted Generalized Column Distances: A Wider Definition., , and . ISIT, page 2783-2787. IEEE, (2019)Linear Models for High-Complexity Sequences., and . ICCSA (1), volume 10404 of Lecture Notes in Computer Science, page 314-324. Springer, (2017)Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs., , and . Log. J. IGPL, 28 (4): 430-448 (2020)Randomness Analysis for the Generalized Self-Shrinking Sequences., , , and . Symmetry, 11 (12): 1460 (2019)An Innovative Linear Complexity Computation for Cryptographic Sequences., , and . CISIS, volume 1267 of Advances in Intelligent Systems and Computing, page 339-349. Springer, (2020)