Results 331 to 340 of about 883,280 (384)
Some of the next articles are maybe not open access.
Stream ciphers for GSM networks
2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record, 2001With the advance of wireless communications technology, mobile communications has become more convenient than ever. However, because of the openness of wireless communications, how to protect the privacy between communicating parties is becoming a very important issue. In this paper, we focus on the security of transferring voice messages on the Global
Chi-Chun Lo, Yu-Jen Chen
openaire +3 more sources
2015
It is desirable that both the encryption and decryption functions be public knowledge and so the secrecy of the message, given the ciphertext, depends totally on the secrecy of the secret key k. Although this well-established principle, called Kerckhoffs’ principle, has been known since the mid-1800s some companies still ignore it and choose to deploy ...
openaire +2 more sources
It is desirable that both the encryption and decryption functions be public knowledge and so the secrecy of the message, given the ciphertext, depends totally on the secrecy of the secret key k. Although this well-established principle, called Kerckhoffs’ principle, has been known since the mid-1800s some companies still ignore it and choose to deploy ...
openaire +2 more sources
Applications to Stream Ciphers
2016In this chapter, after some general observations on stream ciphers and block ciphers and on the fundamental concept of entropy as defined in Information Theory, we apply our ideas of finite fields to linear feedback shift registers (LFSRs), a frequent component of stream cipher designs.
openaire +2 more sources
A Highly Secure Stream Cipher Based On Analog-Digital Hybrid Chaotic System
Information Sciences, 2021Jun Zheng, Hanping Hu
semanticscholar +1 more source
Stream Ciphers and Correlation
1999One important area where sequences find application is cryptography. In the modern electronic era information is stored, processed and transmitted encoded as binary sequences. The automated business environment places great value on this information and it is vital that it is protected. This is often best done by cryptographic means and one such method
K. Brincat, F. C. Piper, P. R. Wild
openaire +2 more sources
Design and efficient implementation of a chaos-based stream cipher
, 2017We designed and implemented a stream cipher cryptosystem based on an efficient chaotic generator of finite computing precision (N = 32). The proposed structure of the chaotic generator is formed by a Key-setup, an IVsetup, a non-volatile memory, an ...
M. A. Taha+3 more
semanticscholar +1 more source
2008
CryptMT version 3 (CryptMT3) is a stream cipher obtained by combining a large LFSR and a nonlinear filter with memory using integer multiplication. Its period is proved to be no less than 219937? 1, and the 8-bit output sequence is at least 1241-dimensionally equidistributed.
Takuji Nishimura+3 more
openaire +1 more source
CryptMT version 3 (CryptMT3) is a stream cipher obtained by combining a large LFSR and a nonlinear filter with memory using integer multiplication. Its period is proved to be no less than 219937? 1, and the 8-bit output sequence is at least 1241-dimensionally equidistributed.
Takuji Nishimura+3 more
openaire +1 more source
Stream cipher designs: a review
Science China Information Sciences, 2020Lin Jiao, Yonglin Hao, D. Feng
semanticscholar +1 more source
2015
We can interpret a pseudo-random function as a stream cipher. Let {F k } K be a PRF family with codomain C of bitstrings of length l. The PRF family immediately defines a stream cipher for messages of length l bits.
openaire +2 more sources
We can interpret a pseudo-random function as a stream cipher. Let {F k } K be a PRF family with codomain C of bitstrings of length l. The PRF family immediately defines a stream cipher for messages of length l bits.
openaire +2 more sources
2009
Stream ciphers are essential tools for encrypting sensitive data. While having the limitation that a single key may never be used twice, they are often very fast and can offer a valuable alternative to block ciphers in many applications. In this contribution we describe a novel stream cipher based on discrete Kolmogorov systems.
openaire +2 more sources
Stream ciphers are essential tools for encrypting sensitive data. While having the limitation that a single key may never be used twice, they are often very fast and can offer a valuable alternative to block ciphers in many applications. In this contribution we describe a novel stream cipher based on discrete Kolmogorov systems.
openaire +2 more sources