Journal articles on the topic 'Keystream'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Keystream.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.
Full textFu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.
Full textShyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.
Full textYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Full textChan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.
Full textDafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.
Full textSavova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.
Full textKANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.
Full textSang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.
Full textGolic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.
Full textKANSO, ALI. "SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR." International Journal of Bifurcation and Chaos 19, no. 12 (2009): 4227–35. http://dx.doi.org/10.1142/s0218127409025316.
Full textJain, Ashish, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, and Partha Chakraborty. "A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption." Complexity 2023 (February 18, 2023): 1–9. http://dx.doi.org/10.1155/2023/7249127.
Full textHromada, Viliam, and Juraj Varga. "Phase-shift fault analysis of Trivium." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 205–20. http://dx.doi.org/10.1556/012.2015.52.2.1308.
Full textSouzaBanegas, Gustavo, and Ricardo Felipe Custodio. "An Efficient Keystream for Cryptographic Applications." International Journal of Computer Applications 109, no. 2 (2015): 1–5. http://dx.doi.org/10.5120/19157-0610.
Full textChambers, W. G., and S. J. Shepherd. "Mutually clock-controlled cipher keystream generators." Electronics Letters 33, no. 12 (1997): 1020. http://dx.doi.org/10.1049/el:19970728.
Full textSuwais, Khaled, and Sally Almanasra. "Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour." Applied Sciences 13, no. 8 (2023): 4669. http://dx.doi.org/10.3390/app13084669.
Full textKuznetsov, O. O., I. D. Gorbenko, Y. I. Gorbenko, A. M. Alekseychuk, and V. A. Tymchenko. "Mathematical structure of the Strumok stream cipher." Radiotekhnika, no. 193 (May 15, 2018): 17–27. http://dx.doi.org/10.30837/rt.2018.2.193.02.
Full textNisviasari, R., Dafik, I. H. Agustin, E. Y. Kurniawati, I. N. Maylisa, and B. J. Septory. "Improving the robustness of the affine cipher by using a rainbow antimagic coloring." Journal of Physics: Conference Series 2157, no. 1 (2022): 012017. http://dx.doi.org/10.1088/1742-6596/2157/1/012017.
Full textGu, Guo Sheng, Jie Ling, Guo Bo Xie, and Yu Yi Ou. "A Chaotic Image Encryption Algorithm Based on a Dynamical Feedback Operation." Advanced Materials Research 989-994 (July 2014): 3561–66. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.3561.
Full textÁlvarez, G., F. Montoya, M. Romera, and G. Pastor. "Keystream cryptanalysis of a chaotic cryptographic method." Computer Physics Communications 156, no. 2 (2004): 205–7. http://dx.doi.org/10.1016/s0010-4655(03)00432-6.
Full textMenicocci, R. "Intrinsic weakness of variable-memory keystream generators." Electronics Letters 30, no. 11 (1994): 850. http://dx.doi.org/10.1049/el:19940573.
Full textKrause, Matthias. "OBDD-Based Cryptanalysis of Oblivious Keystream Generators." Theory of Computing Systems 40, no. 1 (2005): 101–21. http://dx.doi.org/10.1007/s00224-005-1282-8.
Full textKlapper, Andrew. "On the Existence of Secure Keystream Generators." Journal of Cryptology 14, no. 1 (2001): 1–15. http://dx.doi.org/10.1007/s001450010014.
Full textHuang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.
Full textISOBE, Takanori, Toshihiro OHIGASHI, Yuhei WATANABE, and Masakatu MORII. "Comprehensive Analysis of Initial Keystream Biases of RC4." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 1 (2014): 139–51. http://dx.doi.org/10.1587/transfun.e97.a.139.
Full textT, Jan Carlo. "A Keystream-Based Affine Cipher for Dynamic Encryption." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 2919–22. http://dx.doi.org/10.30534/ijeter/2020/06872020.
Full textParker, A. T., and K. M. Short. "Reconstructing the keystream from a chaotic encryption scheme." IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48, no. 5 (2001): 624–30. http://dx.doi.org/10.1109/81.922466.
Full textFuster-Sabater, A., and P. Caballero-Gil. "Global linear complexity analysis of filter keystream generators." IEE Proceedings - Computers and Digital Techniques 144, no. 1 (1997): 33. http://dx.doi.org/10.1049/ip-cdt:19970764.
Full textKimberley, M. "Comparison of two statistical tests for keystream sequences." Electronics Letters 23, no. 8 (1987): 365. http://dx.doi.org/10.1049/el:19870268.
Full textZhi-ping, Wu, Ye Ding-feng, and Ma Wei-ju. "Algebraic attack on Filter-Combiner model keystream generators." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 259–62. http://dx.doi.org/10.1007/bf02828664.
Full textMahdi, Mohammed, and Nidaa Hassan. "A SUGGESTED SUPER SALSA STREAM CIPHER." Iraqi Journal for Computers and Informatics 44, no. 2 (2018): 5–10. http://dx.doi.org/10.25195/ijci.v44i2.51.
Full textAhmad, Musheer. "Chaos Based Mixed Keystream Generation for Voice Data Encryption." International Journal on Cryptography and Information Security 2, no. 1 (2012): 39–48. http://dx.doi.org/10.5121/ijcis.2012.2104.
Full textSalam, Md Iftekhar, and Hoon Jae Lee. "On the algebraic attack against summation type keystream generators." International Journal of Information and Computer Security 5, no. 2 (2012): 132. http://dx.doi.org/10.1504/ijics.2012.051778.
Full textGarcía-Villalba, L. J., and M. C. Rodríguez-Palánquex. "A family of keystream generators with large linear complexity." Applied Mathematics Letters 14, no. 5 (2001): 545–47. http://dx.doi.org/10.1016/s0893-9659(00)00191-9.
Full textBlackburn, S. R. "Cryptanalysis of keystream generator due to Chan and Cheng." Electronics Letters 34, no. 18 (1998): 1737. http://dx.doi.org/10.1049/el:19981226.
Full textSang, Tao, Ruli Wang, and Yixun Yan. "Chaos-based feedforward output functions for combining keystream generators." Journal of Electronics (China) 18, no. 4 (2001): 314–20. http://dx.doi.org/10.1007/s11767-001-0045-0.
Full textWu, Shyi-Tsong. "Hybrid Chaotic Keystream Generator Based on Dawson’s Summation Generator." Sensors and Materials 35, no. 5 (2023): 1687. http://dx.doi.org/10.18494/sam4316.
Full textGül, Çaǧdaş, and Orhun Kara. "Correction to “A New Construction Method for Keystream Generators”." IEEE Transactions on Information Forensics and Security 19 (2024): 4198. http://dx.doi.org/10.1109/tifs.2024.3372200.
Full textKANSO, ALI. "CIPHER SYSTEMS BASED ON CONTROLLED EXACT CHAOTIC MAPS." International Journal of Bifurcation and Chaos 20, no. 12 (2010): 4039–53. http://dx.doi.org/10.1142/s0218127410028173.
Full textHuang, Xiaoling, and Guodong Ye. "An Image Encryption Algorithm Based on Time-Delay and Random Insertion." Entropy 20, no. 12 (2018): 974. http://dx.doi.org/10.3390/e20120974.
Full textHu, Yongsheng, Han Wu, and Luoyu Zhou. "A Novel Hyperchaotic 2D-SFCF with Simple Structure and Its Application in Image Encryption." Entropy 24, no. 9 (2022): 1266. http://dx.doi.org/10.3390/e24091266.
Full textOuyang, Xue, Yuling Luo, Junxiu Liu, Lvchen Cao, and Yunqi Liu. "A color image encryption method based on memristive hyperchaotic system and DNA encryption." International Journal of Modern Physics B 34, no. 04 (2020): 2050014. http://dx.doi.org/10.1142/s0217979220500149.
Full textBulavintsev, Vadim, Alexander Semenov, Oleg Zaikin, and Stepan Kochemazov. "A Bitslice Implementation of Anderson’s Attack on A5/1." Open Engineering 8, no. 1 (2018): 7–16. http://dx.doi.org/10.1515/eng-2018-0002.
Full textChen, E., Lequan Min, and Guanrong Chen. "Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption." International Journal of Bifurcation and Chaos 27, no. 03 (2017): 1750046. http://dx.doi.org/10.1142/s0218127417500468.
Full textNikhil Khandare. "CLS-SE: Continuous Location Sharing Using Geffe Generator Based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 302–21. https://doi.org/10.52783/anvi.v28.4219.
Full textNikhil Khandare. "CLS-SE: Continuous Location Sharing using Geffe Generator based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 7s (2025): 257–76. https://doi.org/10.52783/anvi.v28.4502.
Full textMursidah, Ichsani, Suryadi MT, Sarifuddin Madenda, and Suryadi Harmanto. "Implementation of MS Circle Map in Digital Image Encryption." Applied Sciences 15, no. 13 (2025): 6998. https://doi.org/10.3390/app15136998.
Full textZHANG, Xiaoyan, Qichun WANG, Bin WANG, and Haibin KAN. "A Constructive Method of Algebraic Attack with Less Keystream Bits." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 10 (2011): 2059–62. http://dx.doi.org/10.1587/transfun.e94.a.2059.
Full textAwad, Wasan Shaker. "Finding Linear Equivalence of Keystream Generators Using Genetic Simulated Annealing." Information Technology Journal 7, no. 3 (2008): 541–44. http://dx.doi.org/10.3923/itj.2008.541.544.
Full textGolic, J. D., and S. V. Petrovic. "Correlation attacks on clock-controlled shift registers in keystream generators." IEEE Transactions on Computers 45, no. 4 (1996): 482–86. http://dx.doi.org/10.1109/12.494106.
Full text