102
Views
7
CrossRef citations to date
0
Altmetric
Section A

The invertibility of the XOR of rotations of a binary word

Pages 281-284 | Received 21 Jul 2009, Accepted 21 Dec 2009, Published online: 04 Dec 2010

References

  • Bini , D. , Del Corso , G. M. , Manzini , G. and Margara , L. 2000 . Inversion of circulant matrices over Zm . Math. Comput. , 70 ( 235 ) : 1169 – 1182 .
  • Borghoff , J. , Knudsen , L. R. , Leander , G. and Matusiewicz , K. Cryptanalysis of C2 . Proceedings CRYPTO’09 . Edited by: Halevi , S. Vol. 5671 , pp. 250 – 266 . Berlin : Springer . Lecture Notes in Computer Science
  • Boyack , S. W. 1985 . “ The robustness of combinatorial measures of Boolean matrix complexity ” . MIT Mathematics Department . PhD thesis
  • Contini , S. , Rivest , R. L. , Robshaw , M. J.B. and Yin , Y. L. Improved analysis of some simplified variants of RC6 . Proceedings of the Fast Software Encryption ’99 . Edited by: Knudsen , L. Vol. 1636 , pp. 1 – 15 . Berlin : Springer . Lecture Notes in Computer Science
  • Guan , P. H. and He , Y. 1986 . Exact results for deterministic cellular automata with additive rules . J. Stat. Phys. , 14 ( 3/4 ) : 463 – 478 .
  • Lidl , R. and Niederreiter , H. 1983 . Finite Fields , Vol. 20 , Cambridge : Cambridge University Press . Encyclopedia of Mathematics and Its Applications
  • Marsaglia , G. 2003 . Xorshift RNGs . J. Stat. Soft. , 8 ( 14 ) : 1 – 6 . Avilable at http://www.jstatsoft.org/v08/i14/xorshift.pdf
  • National Institute of Standards and Technology, Secure hash standard, FIPS 180-2, 1 August 2002
  • Panneton , F. and L'Ecuyer , P. 2005 . On the Xorshift random number generators . ACM Trans. Model. Comp. Simul. , 15 ( 4 ) : 346 – 361 .
  • R.L. Rivest, B. Agre, D.V. Bailey, C. Crutchfield, Y. Dodis, K.E. Fleming, A. Khan, J. Krishnamurthy, Y. Lin, L. Reyzin, E. Shen, J. Sukha, D. Sutherland, E. Tromer, and Y.L. Yin, The MD6 hash function: A proposal to NIST for SHA-3, September 2008. Available at http://groups.csail.mit.edu/cis/md6/
  • Schnorr , C. P. and Vaudenay , S. Black box cryptanalysis of hash networks based on multipermutations . Proceedings EUROCRYPT ’94 . Edited by: De Santis , A. Vol. 950 , pp. 47 – 57 . Berlin : Springer . Lecture Notes in Computer Science
  • S.S. Thomsen, Cryptographic hash functions, PhD thesis, Technical University of Denmark, 28 November 2008

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.