On the k-error linear complexity over of Legendre and Sidelnikov sequences H Aly, A Winterhof Designs, Codes and Cryptography 40 (3), 369-374, 2006 | 48 | 2006 |
Attacking aes using bernstein’s attack on modern processors H Aly, M ElGayyar Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on …, 2013 | 40 | 2013 |
On the k-error linear complexity of cyclotomic sequences H Aly, W Meidl, A Winterhof Journal of Mathematical Cryptology 1 (3), 283-296, 2007 | 27 | 2007 |
Boolean functions derived from Fermat quotients H Aly, A Winterhof Cryptography and Communications 3, 165-174, 2011 | 25 | 2011 |
On the Linear Complexity and $ k $-Error Linear Complexity Over ${\BBF} _ {p} $ of the $ d $-ary Sidel'nikov Sequence H Aly, W Meidl IEEE transactions on information theory 53 (12), 4755-4761, 2007 | 16 | 2007 |
On the linear complexity profile of nonlinear congruential pseudorandom number generators with Dickson polynomials H Aly, A Winterhof Des. Codes Cryptogr. 39 (2), 155-162, 2006 | 9 | 2006 |
A Note on Hall’s Sextic Residue Sequence: Correlation Measure of Order and Related Measures of Pseudorandomness H Aly, A Winterhof IEEE Transactions on Information Theory 66 (3), 1944-1947, 2019 | 6 | 2019 |
On the calculation of the linear complexity of periodic sequences H Aly, R Marzouk, W Meidl Finite Fields: Theory and Applications. Contemp. Math 518, 11-22, 2010 | 5 | 2010 |
Polynomial representations of the Lucas logarithm H Aly, A Winterhof Finite Fields and their Applications 12 (3), 413-424, 2006 | 5 | 2006 |
Exact Autocorrelation Values of the Hall’s Sextic Residues Sequences H Aly | | |