The linear complexity and the k-error linear complexity of a sequence have been used as important security measures for key stream sequence strength in linear feedbac k shift register design. Byâ€¦ (More)

The linear complexity and k-error linear complexity of a sequence have been used as important measures of keystre am strength, hence designing a sequence with high linear compl exity and k-errorâ€¦ (More)

The 2nd International Conference on Informationâ€¦

2010

RSA, which based on the great difficulty of integer factorization, is the most widely-used public-key cryptosystem used in electronic commerce. Euclid algorithm and extended Euclid algorithm are theâ€¦ (More)

Based on the definition of generalized partially bent functions, using the theory of linear transformations, the relationship between generalized partially Bent functions over ring ZN and generalizedâ€¦ (More)

Double-loop networks have been widely studied as architecture for local area networks. A double-loop digraph G(N; s<sub>1</sub>, s<sub>2</sub>) has N vertices 0, 1,..., N-l and 2N edges of two types:â€¦ (More)

Based on linear complexity, k-error linear linear complexity, k-error linear complexity profile and minerror, the m-tight error linear complexity is presented to study the stability of the linearâ€¦ (More)

Based on the earlier notions of linear complexity, k-error linear linear complexity, k-error linear complexity profile and minerror, the concept of m-tight error linear complexity is presented toâ€¦ (More)