Author of the publication

Maximal period of orbits of the BBS generator.

, , , and . ICISC, page 71-80. Korea Institute of Information Security and Cryptology (KIISC), (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Twin for Euler's phi Function in F2X., , and . WAIFI, volume 4547 of Lecture Notes in Computer Science, page 318-332. Springer, (2007)Maximal period of orbits of the BBS generator., , , and . ICISC, page 71-80. Korea Institute of Information Security and Cryptology (KIISC), (1998)Maximal Periods of x + c in Fq., , , and . AAECC, volume 2227 of Lecture Notes in Computer Science, page 219-228. Springer, (2001)Challenges and Competences in Master Degrees from a Comprehensive Security Perspective., , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 402-414. Springer, (2021)Lightweight Authentication for RFID Used in VANETs., , , and . EUROCAST (2), volume 6928 of Lecture Notes in Computer Science, page 493-500. Springer, (2011)Linear Complexity of the x2 Mod p Orbits., , and . Inf. Process. Lett., 72 (1-2): 3-7 (1999)A factoring algorithm in F2x., , and . SAC, page 672-676. ACM, (1998)Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems.. Int. J. Netw. Secur., 3 (3): 279-282 (2006)