Certificateless public key cryptosystem overcomes the problem of the certificate management in the certificate-based public key cryptosystem and the inherent key escrow problem in the identity-based… (More)

We discuss the linear complexity of a family of binary threshold sequence defined by the discrete logarithm of integers modulo a large prime. It is proved that the linear complexity is at least the… (More)

Pseudo-random subsets of the set {1, 2, . . . , N} have many applications in the fields of network security, cryptography and other security issues. Recently, Dartyge and Sárközy investigated the… (More)

We present a method for constructing k-ary sequences over elliptic curves. Using the multiplicative character of order k of finite fields, we construct a family of k-ary pseudorandom elliptic curve… (More)

We consider the k-error linear complexity of a new binary sequence of period p2, proposed in the recent paper “New generalized cyclotomic binary sequences of period p2”, by Z. Xiao et al., who… (More)