Busque entre los 167353 recursos disponibles en el repositorio
Mostrar el registro sencillo del ítem
dc.date.accessioned | 2014-10-30T20:30:28Z | |
dc.date.available | 2014-10-30T20:30:28Z | |
dc.date.issued | 2014 | |
dc.identifier.uri | http://sedici.unlp.edu.ar/handle/10915/42156 | |
dc.description.abstract | We present the characteristic and minimal polynomials of the linear algorithms Trivium and Trivium Toy. We show the different cycles and mini-mum lengths obtained. The existence of initial states determining short cycles is verified. Finally, linear Trivium Toy is shown to be as cryptologically secure as the linear Trivium algorithm. | en |
dc.language | en | es |
dc.subject | Trivium | en |
dc.subject | Trivium Toy | en |
dc.subject | cycles | en |
dc.subject | periods | en |
dc.subject | weak initial states | en |
dc.title | Trivium vs. Trivium Toy | en |
dc.type | Objeto de conferencia | es |
sedici.creator.person | Castro Lechtaler, Antonio | es |
sedici.creator.person | Cipriano, Marcelo | es |
sedici.creator.person | García, Edith | es |
sedici.creator.person | Liporace, Julio César | es |
sedici.creator.person | Maiorano, Ariel | es |
sedici.creator.person | Malvacio, Eduardo | es |
sedici.description.note | III Workshop de Seguridad Informática (WSI) | es |
sedici.subject.materias | Ciencias Informáticas | es |
sedici.description.fulltext | true | es |
mods.originInfo.place | Red de Universidades con Carreras de Informática (RedUNCI) | es |
sedici.subtype | Objeto de conferencia | es |
sedici.rights.license | Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) | |
sedici.rights.uri | http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ | |
sedici.date.exposure | 2014-10 | |
sedici.relation.event | XX Congreso Argentino de Ciencias de la Computación (Buenos Aires, 2014) | es |
sedici.description.peerReview | peer-review | es |