Gotowa bibliografia na temat „Keystream”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Keystream”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Keystream"
Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.
Pełny tekst źródłaFu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.
Pełny tekst źródłaShyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.
Pełny tekst źródłaYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Pełny tekst źródłaChan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.
Pełny tekst źródłaDafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.
Pełny tekst źródłaSavova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.
Pełny tekst źródłaKANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.
Pełny tekst źródłaSang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.
Pełny tekst źródłaGolic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.
Pełny tekst źródłaRozprawy doktorskie na temat "Keystream"
Beighton, Matthew. "Security analysis of shift-register based keystream generators for stream ciphers." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236239/1/Matthew%2BBeighton%2BThesis%282%29.pdf.
Pełny tekst źródłaChuah, Chai Wen. "Key derivation function based on stream ciphers." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/71025/1/Chai%20Wen_Chuah_Thesis.pdf.
Pełny tekst źródłaAlhamdan, Ali Abdulaziz. "Secure stream cipher initialisation processes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/66721/1/Ali%20Abdulaziz%20H_Al%20Hamdan_Thesis.pdf.
Pełny tekst źródłaTeo, Sui-Guan. "Analysis of nonlinear sequences and streamciphers." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/63358/1/Sui-Guan_Teo_Thesis.pdf.
Pełny tekst źródłaPenna, Lyta. "Implementation issues in symmetric ciphers." Thesis, Queensland University of Technology, 2002.
Znajdź pełny tekst źródłaSimpson, Leonie Ruth. "Divide and conquer attacks on shift register based stream ciphers." Thesis, Queensland University of Technology, 2000.
Znajdź pełny tekst źródłaDu, Yu-Jing, and 杜雨靜. "FCSR Based Hybrid Keystream Generator." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/78538335864179093009.
Pełny tekst źródłaLiu, Chun-Chen, and 劉峻辰. "The Keystream Generator Based on Hybrid Chaos." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/75995379359030002897.
Pełny tekst źródłaShepherd, Simon J., and Jorge C. Mex-Pereira. "Cryptanalysis of a summation generator with 2 bits of memory." 2002. http://hdl.handle.net/10454/3744.
Pełny tekst źródłaCheng, Tsung-Yuan, and 鄭琮元. "Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack and Known IV Attack." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/37853115115111108080.
Pełny tekst źródłaKsiążki na temat "Keystream"
Leader, Jeffery J. Neural network identification of keystream generators. Naval Postgraduate School, 1993.
Znajdź pełny tekst źródłaLeader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.
Znajdź pełny tekst źródłaCardell, Sara Díaz, and Amparo Fúster-Sabater. Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation. Springer, 2019.
Znajdź pełny tekst źródłaCzęści książek na temat "Keystream"
Ruth Simpson, Leonie, E. Dawson, Jovan Dj Golić, and William L. Millan. "LILI Keystream Generator." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44983-3_18.
Pełny tekst źródłaAnderson, Ross. "On Fibonacci keystream generators." In Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8_26.
Pełny tekst źródłaClark, A., Ed Dawson, J. Fuller, et al. "The LILI-II Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0_3.
Pełny tekst źródłaWatanabe, Dai, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, and Bart Preneel. "A New Keystream Generator MUGI." In Fast Software Encryption. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9_14.
Pełny tekst źródłaMinaud, Brice. "Linear Biases in AEGIS Keystream." In Selected Areas in Cryptography -- SAC 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13051-4_18.
Pełny tekst źródłaKrause, Matthias. "BDD-Based Cryptanalysis of Keystream Generators." In Advances in Cryptology — EUROCRYPT 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46035-7_15.
Pełny tekst źródłaGolić, Jovan Dj. "Intrinsic statistical weakness of keystream generators." In Advances in Cryptology — ASIACRYPT'94. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0000427.
Pełny tekst źródłaCardell, Sara Díaz, and Amparo Fúster-Sabater. "Keystream Generators Based on Irregular Decimation." In SpringerBriefs in Mathematics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12850-0_2.
Pełny tekst źródłaGolić, Jovan D. "Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964_18.
Pełny tekst źródłaNikolov, Nikolai, and Nikolai Stoianov. "A Novel Keystream Generator with Cryptographic Purpose." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30721-8_26.
Pełny tekst źródłaStreszczenia konferencji na temat "Keystream"
Gorbenko, Ivan, Olexandr Kuznetsov, Yuriy Gorbenko, Anton Alekseychuk, and Vlad Tymchenko. "Strumok keystream generator." In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2018. http://dx.doi.org/10.1109/dessert.2018.8409147.
Pełny tekst źródłaHarmouch, Youssef, and Rachid El Kouch. "A chaotic keystream generation for stream cipher." In the International Conference. ACM Press, 2018. http://dx.doi.org/10.1145/3230905.3230942.
Pełny tekst źródłaTounsi, Wiem, Benjamin Justus, Nora Cuppens Boulahia, Frederic Cuppen, and Joaquin Garcia Alfaro. "Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm." In 2014 IEEE 8th International Conference on Software Security and Reliability-Companion (SSIRI-C). IEEE, 2014. http://dx.doi.org/10.1109/sere-c.2014.29.
Pełny tekst źródłaYingsong, Wang, and Chen Wei. "f8 Keystream Generator with SMS4 as Core Algorithm." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.290.
Pełny tekst źródłaDong, Lihua, Yong Zeng, and Yupu Hu. "F-GSS: A Novel FCSR-Based Keystream Generator." In 2009 1st International Conference on Information Science and Engineering (ICISE 2009). IEEE, 2009. http://dx.doi.org/10.1109/icise.2009.578.
Pełny tekst źródłaAbdElHaleem, Sherif H., Ahmed G. Radwan, and Salwa K. Abd-El-Hafiz. "Design of pseudo random keystream generator using fractals." In 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2013. http://dx.doi.org/10.1109/icecs.2013.6815554.
Pełny tekst źródłaBelmeguenai, Aissa, Oulaya Berrak, and Khaled Mansouri. "Image Encryption using Improved Keystream Generator of Achterbahn-128." In International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2016. http://dx.doi.org/10.5220/0005713503330339.
Pełny tekst źródłaKharel, Rupak, K. Busawon, and Z. Ghassemlooy. "Indirect coupled oscillators for keystream generation in secure chaotic communication." In 2009 Joint 48th IEEE Conference on Decision and Control (CDC) and 28th Chinese Control Conference (CCC). IEEE, 2009. http://dx.doi.org/10.1109/cdc.2009.5400056.
Pełny tekst źródłaKumar, P., M. I. Salam, A. G. Reza, Hyo Taek Lim, and Hoon Jae Lee. "Performance analysis of PingPong-128 keystream generator for wireless sensor networks." In 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccit.2010.5711136.
Pełny tekst źródłaZhang, Juanjuan, and Yunqing Xu. "Stream Cipher Based on Quasigroups with Keystream Period of Arbitrary Length." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.213.
Pełny tekst źródłaRaporty organizacyjne na temat "Keystream"
Leader, Jeffery J., and James E. Heyman. Neural Network Identification of Keystream Generators. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265778.
Pełny tekst źródłaLeader, Jeffrey J. Chaotic Keystream Generators for Additive Stream Ciphers. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265824.
Pełny tekst źródła