Results 331 to 340 of about 883,280 (384)
Some of the next articles are maybe not open access.

Stream ciphers for GSM networks

2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record, 2001
With the advance of wireless communications technology, mobile communications has become more convenient than ever. However, because of the openness of wireless communications, how to protect the privacy between communicating parties is becoming a very important issue. In this paper, we focus on the security of transferring voice messages on the Global
Chi-Chun Lo, Yu-Jen Chen
openaire   +3 more sources

Historical Stream Ciphers

2015
It is desirable that both the encryption and decryption functions be public knowledge and so the secrecy of the message, given the ciphertext, depends totally on the secrecy of the secret key k. Although this well-established principle, called Kerckhoffs’ principle, has been known since the mid-1800s some companies still ignore it and choose to deploy ...
openaire   +2 more sources

Applications to Stream Ciphers

2016
In this chapter, after some general observations on stream ciphers and block ciphers and on the fundamental concept of entropy as defined in Information Theory, we apply our ideas of finite fields to linear feedback shift registers (LFSRs), a frequent component of stream cipher designs.
openaire   +2 more sources

Stream Ciphers and Correlation

1999
One important area where sequences find application is cryptography. In the modern electronic era information is stored, processed and transmitted encoded as binary sequences. The automated business environment places great value on this information and it is vital that it is protected. This is often best done by cryptographic means and one such method
K. Brincat, F. C. Piper, P. R. Wild
openaire   +2 more sources

Design and efficient implementation of a chaos-based stream cipher

, 2017
We designed and implemented a stream cipher cryptosystem based on an efficient chaotic generator of finite computing precision (N = 32). The proposed structure of the chaotic generator is formed by a Key-setup, an IVsetup, a non-volatile memory, an ...
M. A. Taha   +3 more
semanticscholar   +1 more source

CryptMT3 Stream Cipher

2008
CryptMT version 3 (CryptMT3) is a stream cipher obtained by combining a large LFSR and a nonlinear filter with memory using integer multiplication. Its period is proved to be no less than 219937? 1, and the 8-bit output sequence is at least 1241-dimensionally equidistributed.
Takuji Nishimura   +3 more
openaire   +1 more source

Stream cipher designs: a review

Science China Information Sciences, 2020
Lin Jiao, Yonglin Hao, D. Feng
semanticscholar   +1 more source

Modern Stream Ciphers

2015
We can interpret a pseudo-random function as a stream cipher. Let {F k } K be a PRF family with codomain C of bitstrings of length l. The PRF family immediately defines a stream cipher for messages of length l bits.
openaire   +2 more sources

Kolmogorov Stream Ciphers

2009
Stream ciphers are essential tools for encrypting sensitive data. While having the limitation that a single key may never be used twice, they are often very fast and can offer a valuable alternative to block ciphers in many applications. In this contribution we describe a novel stream cipher based on discrete Kolmogorov systems.
openaire   +2 more sources

Home - About - Disclaimer - Privacy