Academic literature on the topic 'Keystream'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Keystream.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Keystream"
Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.
Full textFu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.
Full textShyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.
Full textYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Full textChan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.
Full textDafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.
Full textSavova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.
Full textKANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.
Full textSang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.
Full textGolic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.
Full textDissertations / Theses on the topic "Keystream"
Beighton, Matthew. "Security analysis of shift-register based keystream generators for stream ciphers." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236239/1/Matthew%2BBeighton%2BThesis%282%29.pdf.
Full textChuah, Chai Wen. "Key derivation function based on stream ciphers." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/71025/1/Chai%20Wen_Chuah_Thesis.pdf.
Full textAlhamdan, Ali Abdulaziz. "Secure stream cipher initialisation processes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/66721/1/Ali%20Abdulaziz%20H_Al%20Hamdan_Thesis.pdf.
Full textTeo, Sui-Guan. "Analysis of nonlinear sequences and streamciphers." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/63358/1/Sui-Guan_Teo_Thesis.pdf.
Full textPenna, Lyta. "Implementation issues in symmetric ciphers." Thesis, Queensland University of Technology, 2002.
Find full textSimpson, Leonie Ruth. "Divide and conquer attacks on shift register based stream ciphers." Thesis, Queensland University of Technology, 2000.
Find full textDu, Yu-Jing, and 杜雨靜. "FCSR Based Hybrid Keystream Generator." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/78538335864179093009.
Full textLiu, Chun-Chen, and 劉峻辰. "The Keystream Generator Based on Hybrid Chaos." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/75995379359030002897.
Full textShepherd, Simon J., and Jorge C. Mex-Pereira. "Cryptanalysis of a summation generator with 2 bits of memory." 2002. http://hdl.handle.net/10454/3744.
Full textCheng, Tsung-Yuan, and 鄭琮元. "Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack and Known IV Attack." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/37853115115111108080.
Full textBooks on the topic "Keystream"
Leader, Jeffery J. Neural network identification of keystream generators. Naval Postgraduate School, 1993.
Find full textLeader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.
Find full textCardell, Sara Díaz, and Amparo Fúster-Sabater. Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation. Springer, 2019.
Find full textBook chapters on the topic "Keystream"
Ruth Simpson, Leonie, E. Dawson, Jovan Dj Golić, and William L. Millan. "LILI Keystream Generator." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44983-3_18.
Full textAnderson, Ross. "On Fibonacci keystream generators." In Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8_26.
Full textClark, A., Ed Dawson, J. Fuller, et al. "The LILI-II Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0_3.
Full textWatanabe, Dai, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, and Bart Preneel. "A New Keystream Generator MUGI." In Fast Software Encryption. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9_14.
Full textMinaud, Brice. "Linear Biases in AEGIS Keystream." In Selected Areas in Cryptography -- SAC 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13051-4_18.
Full textKrause, Matthias. "BDD-Based Cryptanalysis of Keystream Generators." In Advances in Cryptology — EUROCRYPT 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46035-7_15.
Full textGolić, Jovan Dj. "Intrinsic statistical weakness of keystream generators." In Advances in Cryptology — ASIACRYPT'94. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0000427.
Full textCardell, Sara Díaz, and Amparo Fúster-Sabater. "Keystream Generators Based on Irregular Decimation." In SpringerBriefs in Mathematics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12850-0_2.
Full textGolić, Jovan D. "Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964_18.
Full textNikolov, Nikolai, and Nikolai Stoianov. "A Novel Keystream Generator with Cryptographic Purpose." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30721-8_26.
Full textConference papers on the topic "Keystream"
Gorbenko, Ivan, Olexandr Kuznetsov, Yuriy Gorbenko, Anton Alekseychuk, and Vlad Tymchenko. "Strumok keystream generator." In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2018. http://dx.doi.org/10.1109/dessert.2018.8409147.
Full textHarmouch, Youssef, and Rachid El Kouch. "A chaotic keystream generation for stream cipher." In the International Conference. ACM Press, 2018. http://dx.doi.org/10.1145/3230905.3230942.
Full textTounsi, Wiem, Benjamin Justus, Nora Cuppens Boulahia, Frederic Cuppen, and Joaquin Garcia Alfaro. "Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm." In 2014 IEEE 8th International Conference on Software Security and Reliability-Companion (SSIRI-C). IEEE, 2014. http://dx.doi.org/10.1109/sere-c.2014.29.
Full textYingsong, Wang, and Chen Wei. "f8 Keystream Generator with SMS4 as Core Algorithm." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.290.
Full textDong, Lihua, Yong Zeng, and Yupu Hu. "F-GSS: A Novel FCSR-Based Keystream Generator." In 2009 1st International Conference on Information Science and Engineering (ICISE 2009). IEEE, 2009. http://dx.doi.org/10.1109/icise.2009.578.
Full textAbdElHaleem, Sherif H., Ahmed G. Radwan, and Salwa K. Abd-El-Hafiz. "Design of pseudo random keystream generator using fractals." In 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2013. http://dx.doi.org/10.1109/icecs.2013.6815554.
Full textBelmeguenai, Aissa, Oulaya Berrak, and Khaled Mansouri. "Image Encryption using Improved Keystream Generator of Achterbahn-128." In International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2016. http://dx.doi.org/10.5220/0005713503330339.
Full textKharel, Rupak, K. Busawon, and Z. Ghassemlooy. "Indirect coupled oscillators for keystream generation in secure chaotic communication." In 2009 Joint 48th IEEE Conference on Decision and Control (CDC) and 28th Chinese Control Conference (CCC). IEEE, 2009. http://dx.doi.org/10.1109/cdc.2009.5400056.
Full textKumar, P., M. I. Salam, A. G. Reza, Hyo Taek Lim, and Hoon Jae Lee. "Performance analysis of PingPong-128 keystream generator for wireless sensor networks." In 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccit.2010.5711136.
Full textZhang, Juanjuan, and Yunqing Xu. "Stream Cipher Based on Quasigroups with Keystream Period of Arbitrary Length." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.213.
Full textReports on the topic "Keystream"
Leader, Jeffery J., and James E. Heyman. Neural Network Identification of Keystream Generators. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265778.
Full textLeader, Jeffrey J. Chaotic Keystream Generators for Additive Stream Ciphers. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265824.
Full text