Efficient, perfect polynomial random number generators S. MicaliC. P. Schnorr OriginalPaper Pages: 157 - 172
New bounds and constructions for authentication/secrecy codes with splitting Marijke De Soete OriginalPaper Pages: 173 - 186
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance Jovan Dj. GolićMiodrag J. Mihaljević OriginalPaper Pages: 201 - 212