Gotowa bibliografia na temat „Keystream”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Keystream”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Keystream"

1

Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.

Pełny tekst źródła
Streszczenie:
The traditional basis for constructing modern stream ciphers is keystream generators, which are based on linear shift registers and nonlinear complexity elements. One of the well-known methods for increasing the resistance of such generators, in particular, against algebraic and correlation attacks, is using irregularity into register’s motion process. The most popular keystream generators with irregular motion, used in stream ciphers are A5/1, Alpha1, LILI-128 and others, were thoroughly studied in the 1990s and 2000s. However, specialists’ interest remains relevant, it’s evidenced by recent
Style APA, Harvard, Vancouver, ISO itp.
2

Fu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.

Pełny tekst źródła
Streszczenie:
This paper suggests a new chaos-based color image cipher with an efficient substitution keystream generation strategy. The hyperchaotic Lü system and logistic map are employed to generate the permutation and substitution keystream sequences for image data scrambling and mixing. In the permutation stage, the positions of colored subpixels in the input image are scrambled using a pixel-swapping mechanism, which avoids two main problems encountered when using the discretized version of area-preserving chaotic maps. In the substitution stage, we introduce an efficient keystream generation method t
Style APA, Harvard, Vancouver, ISO itp.
3

Shyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.

Pełny tekst źródła
Streszczenie:
<p>Recently, there have been some studies on security applications using cellular automata. A cellular automaton (CA) is characterized by simplicity and high-speed computation, making it suitable for the resource-constrained IoT environment. In this paper, we first merge a sliding-window, bit permutation, and a CA and propose a keystream generator that has the inherent CA advantages of simplicity and speed. The sliding-window provides the unpredictability of the keystream and gains strength in terms of security. The produced keystream has passed the tests of NIST SP800-22. On the basis o
Style APA, Harvard, Vancouver, ISO itp.
4

Yerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.

Pełny tekst źródła
Streszczenie:
For a stream cipher to be secure, the keystream generated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certain probability distribution. In this paper, we perform a detailed statistical analysis of various stream ciphers used in GSM 2G,3G, 4G and 5G communications. The sequences output by these ciphers are checked for randomness using the statistical tests defined by the NIST Test Suite. It should also be not possible to derive any information about secret key and the initial state ofthe cipher from the keystream. Therefore, ad
Style APA, Harvard, Vancouver, ISO itp.
5

Chan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Dafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.

Pełny tekst źródła
Streszczenie:
Message security remains a vital concern in cryptography. This paper introduces a novel enhancement to the classical Caesar cipher by generating a keystream from a Hyper-Ladder Graph, which combines hypergraph and ladder graph properties to produce complex and unpredictable patterns. The proposed method is evaluated against AES, DES, ChaCha20, and XChaCha20, showing superior performance in encryption time and memory efficiency, especially in constrained environments. To demonstrate broader applicability, we implemented the keystream in grayscale image watermarking. The binary keystream was fir
Style APA, Harvard, Vancouver, ISO itp.
7

Savova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.

Pełny tekst źródła
Streszczenie:
Multi-level signals and sequences have become a significant aspect of modern high-speed communication systems. Hence, to ensure the confidentiality and integrity of the transmitted information, advanced methods and devices are necessary to produce strong cryptographic properties for not only binary but also for nonbinary keystreams, which can be used in resource-constrained microcontrollers. The proposed method and apparatus generate both a balanced nonlinear 5-ary pseudo-random sequence and a binary keystream sequence. The nonlinearity is determined by applying shrinking and multiplexing tech
Style APA, Harvard, Vancouver, ISO itp.
8

KANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.

Pełny tekst źródła
Streszczenie:
This paper proposes a new technique for generating random-looking binary digits based on an irregularly decimated chaotic map. We present a class of irregularly decimated chaos-based keystream generators, related to the shrinking generator, for the generation of binary sequences. Each generator consists of two subsystems: a control subsystem and a generating subsystem, where each subsystem is based on a single chaotic map. This chaotic map is presented as a 1-D piecewise chaotic map related to the chaotic logistic map. We conduct an analysis of the dynamical behavior of the proposed map to int
Style APA, Harvard, Vancouver, ISO itp.
9

Sang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Golic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Keystream"

1

Beighton, Matthew. "Security analysis of shift-register based keystream generators for stream ciphers." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236239/1/Matthew%2BBeighton%2BThesis%282%29.pdf.

Pełny tekst źródła
Streszczenie:
Society's thirst for smaller, faster and more complex technology requires highly secure cryptosystems. These systems are under constant pressure to evolve higher levels of security integrated within ever-shrinking, highly complex hardware, with minimal runtime costs. These demands have focused attention on the design of lightweight cryptographic algorithms because of their speed. The research presented in this thesis focuses on the design and security analysis of lightweight stream ciphers capable of authenticated encryption with associated data (AEAD), proposed as part of the National Institu
Style APA, Harvard, Vancouver, ISO itp.
2

Chuah, Chai Wen. "Key derivation function based on stream ciphers." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/71025/1/Chai%20Wen_Chuah_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of t
Style APA, Harvard, Vancouver, ISO itp.
3

Alhamdan, Ali Abdulaziz. "Secure stream cipher initialisation processes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/66721/1/Ali%20Abdulaziz%20H_Al%20Hamdan_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initiali
Style APA, Harvard, Vancouver, ISO itp.
4

Teo, Sui-Guan. "Analysis of nonlinear sequences and streamciphers." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/63358/1/Sui-Guan_Teo_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream gener
Style APA, Harvard, Vancouver, ISO itp.
5

Penna, Lyta. "Implementation issues in symmetric ciphers." Thesis, Queensland University of Technology, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Simpson, Leonie Ruth. "Divide and conquer attacks on shift register based stream ciphers." Thesis, Queensland University of Technology, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Du, Yu-Jing, and 杜雨靜. "FCSR Based Hybrid Keystream Generator." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/78538335864179093009.

Pełny tekst źródła
Streszczenie:
碩士<br>國立宜蘭大學<br>電子工程學系碩士班<br>99<br>Linear Feedback Shift Register (LFSR) is the basic structure of stream cipher, and Feedback with Carry Shift Register (FCSR) is the nonlinear analogues of LFSR. FCSR is a new feedback architecture to generate long pseudorandom sequence. In this thesis, we study the characteristics of FCSR based nonlinear circuits such as Dawson’s Summation Generator (DSG), lp-Geffe generator and etc. Then we apply FCSR based DSG and lp-Geffe generator as nonlinear combining elements to increase the period and the linear complexity of the output sequence. In addition, we furth
Style APA, Harvard, Vancouver, ISO itp.
8

Liu, Chun-Chen, and 劉峻辰. "The Keystream Generator Based on Hybrid Chaos." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/75995379359030002897.

Pełny tekst źródła
Streszczenie:
碩士<br>國立宜蘭大學<br>電子工程學系碩士班<br>103<br>In recent years, chaotic theorem has been applied in cryptography, and many stream ciphers based on chaos were proposed. In this thesis, we propose the new hybrid keystream generators based on chaos. We use the one-dimensional chaotic maps to reduce the operation load. In addition, to increase the randomness and the linear complexity of output sequence, we merge different one-dimensional chaotic system to build the structure of the hybrid keystream generators. First we apply the linear Exclusive OR as the combining element. Besides, we exploit the Dawson’s S
Style APA, Harvard, Vancouver, ISO itp.
9

Shepherd, Simon J., and Jorge C. Mex-Pereira. "Cryptanalysis of a summation generator with 2 bits of memory." 2002. http://hdl.handle.net/10454/3744.

Pełny tekst źródła
Streszczenie:
No<br>The conventional summation generator (SG) has been broken in the past using a number of different methods. Recently, a modified SG was proposed by Lee and Moon to increase the resistance of such generators against these attacks. However, this paper shows that even the modified generator is still vulnerable to correlation attacks.
Style APA, Harvard, Vancouver, ISO itp.
10

Cheng, Tsung-Yuan, and 鄭琮元. "Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack and Known IV Attack." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/37853115115111108080.

Pełny tekst źródła
Streszczenie:
碩士<br>國立東華大學<br>資訊工程學系<br>91<br>The security mechanisms of IEEE 802.11b wireless network standard are Wired Equivalent Privacy (WEP) protocol and Extended Service Set Identifier (ESSID). The WEP uses the stream cipher RC4 to protect communication from eavesdropping. ESSID is used for access control. Both of them assure the privacy of IEEE 802.11b.However, in WEP protocol, using RC4 stream cipher has security flaws. The WEP protocol is vulnerable to two effective attacks. One is the keystream reuse attack that aims at public initialization vector (IV) and fixed secret key in WEP header. Since p
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Keystream"

1

Leader, Jeffery J. Neural network identification of keystream generators. Naval Postgraduate School, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Leader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Cardell, Sara Díaz, and Amparo Fúster-Sabater. Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation. Springer, 2019.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Keystream"

1

Ruth Simpson, Leonie, E. Dawson, Jovan Dj Golić, and William L. Millan. "LILI Keystream Generator." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44983-3_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Anderson, Ross. "On Fibonacci keystream generators." In Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8_26.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Clark, A., Ed Dawson, J. Fuller, et al. "The LILI-II Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Watanabe, Dai, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, and Bart Preneel. "A New Keystream Generator MUGI." In Fast Software Encryption. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Minaud, Brice. "Linear Biases in AEGIS Keystream." In Selected Areas in Cryptography -- SAC 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13051-4_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Krause, Matthias. "BDD-Based Cryptanalysis of Keystream Generators." In Advances in Cryptology — EUROCRYPT 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46035-7_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Golić, Jovan Dj. "Intrinsic statistical weakness of keystream generators." In Advances in Cryptology — ASIACRYPT'94. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0000427.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Cardell, Sara Díaz, and Amparo Fúster-Sabater. "Keystream Generators Based on Irregular Decimation." In SpringerBriefs in Mathematics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12850-0_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Golić, Jovan D. "Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Nikolov, Nikolai, and Nikolai Stoianov. "A Novel Keystream Generator with Cryptographic Purpose." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30721-8_26.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Keystream"

1

Gorbenko, Ivan, Olexandr Kuznetsov, Yuriy Gorbenko, Anton Alekseychuk, and Vlad Tymchenko. "Strumok keystream generator." In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2018. http://dx.doi.org/10.1109/dessert.2018.8409147.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Harmouch, Youssef, and Rachid El Kouch. "A chaotic keystream generation for stream cipher." In the International Conference. ACM Press, 2018. http://dx.doi.org/10.1145/3230905.3230942.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tounsi, Wiem, Benjamin Justus, Nora Cuppens Boulahia, Frederic Cuppen, and Joaquin Garcia Alfaro. "Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm." In 2014 IEEE 8th International Conference on Software Security and Reliability-Companion (SSIRI-C). IEEE, 2014. http://dx.doi.org/10.1109/sere-c.2014.29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Yingsong, Wang, and Chen Wei. "f8 Keystream Generator with SMS4 as Core Algorithm." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.290.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Dong, Lihua, Yong Zeng, and Yupu Hu. "F-GSS: A Novel FCSR-Based Keystream Generator." In 2009 1st International Conference on Information Science and Engineering (ICISE 2009). IEEE, 2009. http://dx.doi.org/10.1109/icise.2009.578.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

AbdElHaleem, Sherif H., Ahmed G. Radwan, and Salwa K. Abd-El-Hafiz. "Design of pseudo random keystream generator using fractals." In 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2013. http://dx.doi.org/10.1109/icecs.2013.6815554.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Belmeguenai, Aissa, Oulaya Berrak, and Khaled Mansouri. "Image Encryption using Improved Keystream Generator of Achterbahn-128." In International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2016. http://dx.doi.org/10.5220/0005713503330339.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kharel, Rupak, K. Busawon, and Z. Ghassemlooy. "Indirect coupled oscillators for keystream generation in secure chaotic communication." In 2009 Joint 48th IEEE Conference on Decision and Control (CDC) and 28th Chinese Control Conference (CCC). IEEE, 2009. http://dx.doi.org/10.1109/cdc.2009.5400056.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kumar, P., M. I. Salam, A. G. Reza, Hyo Taek Lim, and Hoon Jae Lee. "Performance analysis of PingPong-128 keystream generator for wireless sensor networks." In 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccit.2010.5711136.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Zhang, Juanjuan, and Yunqing Xu. "Stream Cipher Based on Quasigroups with Keystream Period of Arbitrary Length." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.213.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Keystream"

1

Leader, Jeffery J., and James E. Heyman. Neural Network Identification of Keystream Generators. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265778.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Leader, Jeffrey J. Chaotic Keystream Generators for Additive Stream Ciphers. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265824.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!