Abstract
Solutions to the exercises from the previous chapter.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Coppersmith, D.: Finding a small root of a bivariate equation; factoring with high bits known. In: Maurer, U.M. (ed.) EUROCRYPT. LNCS, vol. 1070, pp. 178–189. Springer, Berlin (1996)
Coudert, O., Berthet, C., Madre, J.C.: Verification of synchronous sequential machines based on symbolic execution. In: Automatic Verification Methods for Finite State Systems. LNCS, vol. 407, pp. 365–373. Springer, Berlin (1989)
Doyle, A.C.: The Return of Sherlock Holmes, chapter The Adventure of the Dancing Men. Georges Newnes, Ltd (1905). Originally published 1903, Available online http://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men
Finny: A RC4 cycle that can’t happen. Posting to sci.crypt, September 1994
Gaines, H.F.: Cryptanalysis. Dover, New York (1956)
Knuth, D.E.: The Art of Computer Programming, vol. 4. Generating All Tuples and Permutations. Addison-Wesley, Upper Saddle River (2005)
Krause, M.: BDD-based attacks of keystream generators. In: Knudson, L. (ed.) Advances in Cryptology—EUROCRYPT ’02. LNCS, vol. 1462, pp. 222–237. Springer, Berlin (2002)
Meier, W., Staffelbach, O.: The self-shrinking generator. In: Proceedings of EUROCRYPT ’94. LNCS, vol. 950, pp. 205–214 (1994)
Odlyzko, A.M.: The rise and fall of the knapsack cryptosystem. In: Pomerance, C. (ed.) Cryptology and Computational Number Theory. Proceeding of Symposia in Applied Mathematics, vol. 42, pp. 75–88. American Mathematical Society, Providence (1990)
Poe, E.A.: A Few Words on Secret Writing. Graham’s Magazine. July 1841
Poe, E.A.: The Gold-Bug. The Dollar Newspaper (Philadelphia, PA), vol. I, no. 23, pp. 1 and 4, June 28 1843. Available online http://www.eapoe.org/works/tales/goldbga2.htm
Shamir, A., Zippel, R.E.: On the security of the Merkel-Hellman cryptographic scheme. IEEE Trans. Inf. Theory IT-26(3), 339–340 (1980)
Warren, H.S. Jr: Homepage of Hacker’s Delight. http://www.hackersdelight.org/. Contains example programs, errata and additional material
Wegner, P.: A technique for counting ones in a binary computer. Commun. ACM 3, 322 (1960)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Klein, A. (2013). Solutions. In: Stream Ciphers. Springer, London. https://doi.org/10.1007/978-1-4471-5079-4_18
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5079-4_18
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5078-7
Online ISBN: 978-1-4471-5079-4
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)