Artykuły w czasopismach na temat „Keystream”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Keystream”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.
Pełny tekst źródłaFu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.
Pełny tekst źródłaShyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.
Pełny tekst źródłaYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Pełny tekst źródłaChan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.
Pełny tekst źródłaDafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.
Pełny tekst źródłaSavova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.
Pełny tekst źródłaKANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.
Pełny tekst źródłaSang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.
Pełny tekst źródłaGolic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.
Pełny tekst źródłaKANSO, ALI. "SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR." International Journal of Bifurcation and Chaos 19, no. 12 (2009): 4227–35. http://dx.doi.org/10.1142/s0218127409025316.
Pełny tekst źródłaJain, Ashish, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, and Partha Chakraborty. "A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption." Complexity 2023 (February 18, 2023): 1–9. http://dx.doi.org/10.1155/2023/7249127.
Pełny tekst źródłaHromada, Viliam, and Juraj Varga. "Phase-shift fault analysis of Trivium." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 205–20. http://dx.doi.org/10.1556/012.2015.52.2.1308.
Pełny tekst źródłaSouzaBanegas, Gustavo, and Ricardo Felipe Custodio. "An Efficient Keystream for Cryptographic Applications." International Journal of Computer Applications 109, no. 2 (2015): 1–5. http://dx.doi.org/10.5120/19157-0610.
Pełny tekst źródłaChambers, W. G., and S. J. Shepherd. "Mutually clock-controlled cipher keystream generators." Electronics Letters 33, no. 12 (1997): 1020. http://dx.doi.org/10.1049/el:19970728.
Pełny tekst źródłaSuwais, Khaled, and Sally Almanasra. "Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour." Applied Sciences 13, no. 8 (2023): 4669. http://dx.doi.org/10.3390/app13084669.
Pełny tekst źródłaKuznetsov, O. O., I. D. Gorbenko, Y. I. Gorbenko, A. M. Alekseychuk, and V. A. Tymchenko. "Mathematical structure of the Strumok stream cipher." Radiotekhnika, no. 193 (May 15, 2018): 17–27. http://dx.doi.org/10.30837/rt.2018.2.193.02.
Pełny tekst źródłaNisviasari, R., Dafik, I. H. Agustin, E. Y. Kurniawati, I. N. Maylisa, and B. J. Septory. "Improving the robustness of the affine cipher by using a rainbow antimagic coloring." Journal of Physics: Conference Series 2157, no. 1 (2022): 012017. http://dx.doi.org/10.1088/1742-6596/2157/1/012017.
Pełny tekst źródłaGu, Guo Sheng, Jie Ling, Guo Bo Xie, and Yu Yi Ou. "A Chaotic Image Encryption Algorithm Based on a Dynamical Feedback Operation." Advanced Materials Research 989-994 (July 2014): 3561–66. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.3561.
Pełny tekst źródłaÁlvarez, G., F. Montoya, M. Romera, and G. Pastor. "Keystream cryptanalysis of a chaotic cryptographic method." Computer Physics Communications 156, no. 2 (2004): 205–7. http://dx.doi.org/10.1016/s0010-4655(03)00432-6.
Pełny tekst źródłaMenicocci, R. "Intrinsic weakness of variable-memory keystream generators." Electronics Letters 30, no. 11 (1994): 850. http://dx.doi.org/10.1049/el:19940573.
Pełny tekst źródłaKrause, Matthias. "OBDD-Based Cryptanalysis of Oblivious Keystream Generators." Theory of Computing Systems 40, no. 1 (2005): 101–21. http://dx.doi.org/10.1007/s00224-005-1282-8.
Pełny tekst źródłaKlapper, Andrew. "On the Existence of Secure Keystream Generators." Journal of Cryptology 14, no. 1 (2001): 1–15. http://dx.doi.org/10.1007/s001450010014.
Pełny tekst źródłaHuang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.
Pełny tekst źródłaISOBE, Takanori, Toshihiro OHIGASHI, Yuhei WATANABE, and Masakatu MORII. "Comprehensive Analysis of Initial Keystream Biases of RC4." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 1 (2014): 139–51. http://dx.doi.org/10.1587/transfun.e97.a.139.
Pełny tekst źródłaT, Jan Carlo. "A Keystream-Based Affine Cipher for Dynamic Encryption." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 2919–22. http://dx.doi.org/10.30534/ijeter/2020/06872020.
Pełny tekst źródłaParker, A. T., and K. M. Short. "Reconstructing the keystream from a chaotic encryption scheme." IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48, no. 5 (2001): 624–30. http://dx.doi.org/10.1109/81.922466.
Pełny tekst źródłaFuster-Sabater, A., and P. Caballero-Gil. "Global linear complexity analysis of filter keystream generators." IEE Proceedings - Computers and Digital Techniques 144, no. 1 (1997): 33. http://dx.doi.org/10.1049/ip-cdt:19970764.
Pełny tekst źródłaKimberley, M. "Comparison of two statistical tests for keystream sequences." Electronics Letters 23, no. 8 (1987): 365. http://dx.doi.org/10.1049/el:19870268.
Pełny tekst źródłaZhi-ping, Wu, Ye Ding-feng, and Ma Wei-ju. "Algebraic attack on Filter-Combiner model keystream generators." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 259–62. http://dx.doi.org/10.1007/bf02828664.
Pełny tekst źródłaMahdi, Mohammed, and Nidaa Hassan. "A SUGGESTED SUPER SALSA STREAM CIPHER." Iraqi Journal for Computers and Informatics 44, no. 2 (2018): 5–10. http://dx.doi.org/10.25195/ijci.v44i2.51.
Pełny tekst źródłaAhmad, Musheer. "Chaos Based Mixed Keystream Generation for Voice Data Encryption." International Journal on Cryptography and Information Security 2, no. 1 (2012): 39–48. http://dx.doi.org/10.5121/ijcis.2012.2104.
Pełny tekst źródłaSalam, Md Iftekhar, and Hoon Jae Lee. "On the algebraic attack against summation type keystream generators." International Journal of Information and Computer Security 5, no. 2 (2012): 132. http://dx.doi.org/10.1504/ijics.2012.051778.
Pełny tekst źródłaGarcía-Villalba, L. J., and M. C. Rodríguez-Palánquex. "A family of keystream generators with large linear complexity." Applied Mathematics Letters 14, no. 5 (2001): 545–47. http://dx.doi.org/10.1016/s0893-9659(00)00191-9.
Pełny tekst źródłaBlackburn, S. R. "Cryptanalysis of keystream generator due to Chan and Cheng." Electronics Letters 34, no. 18 (1998): 1737. http://dx.doi.org/10.1049/el:19981226.
Pełny tekst źródłaSang, Tao, Ruli Wang, and Yixun Yan. "Chaos-based feedforward output functions for combining keystream generators." Journal of Electronics (China) 18, no. 4 (2001): 314–20. http://dx.doi.org/10.1007/s11767-001-0045-0.
Pełny tekst źródłaWu, Shyi-Tsong. "Hybrid Chaotic Keystream Generator Based on Dawson’s Summation Generator." Sensors and Materials 35, no. 5 (2023): 1687. http://dx.doi.org/10.18494/sam4316.
Pełny tekst źródłaGül, Çaǧdaş, and Orhun Kara. "Correction to “A New Construction Method for Keystream Generators”." IEEE Transactions on Information Forensics and Security 19 (2024): 4198. http://dx.doi.org/10.1109/tifs.2024.3372200.
Pełny tekst źródłaKANSO, ALI. "CIPHER SYSTEMS BASED ON CONTROLLED EXACT CHAOTIC MAPS." International Journal of Bifurcation and Chaos 20, no. 12 (2010): 4039–53. http://dx.doi.org/10.1142/s0218127410028173.
Pełny tekst źródłaHuang, Xiaoling, and Guodong Ye. "An Image Encryption Algorithm Based on Time-Delay and Random Insertion." Entropy 20, no. 12 (2018): 974. http://dx.doi.org/10.3390/e20120974.
Pełny tekst źródłaHu, Yongsheng, Han Wu, and Luoyu Zhou. "A Novel Hyperchaotic 2D-SFCF with Simple Structure and Its Application in Image Encryption." Entropy 24, no. 9 (2022): 1266. http://dx.doi.org/10.3390/e24091266.
Pełny tekst źródłaOuyang, Xue, Yuling Luo, Junxiu Liu, Lvchen Cao, and Yunqi Liu. "A color image encryption method based on memristive hyperchaotic system and DNA encryption." International Journal of Modern Physics B 34, no. 04 (2020): 2050014. http://dx.doi.org/10.1142/s0217979220500149.
Pełny tekst źródłaBulavintsev, Vadim, Alexander Semenov, Oleg Zaikin, and Stepan Kochemazov. "A Bitslice Implementation of Anderson’s Attack on A5/1." Open Engineering 8, no. 1 (2018): 7–16. http://dx.doi.org/10.1515/eng-2018-0002.
Pełny tekst źródłaChen, E., Lequan Min, and Guanrong Chen. "Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption." International Journal of Bifurcation and Chaos 27, no. 03 (2017): 1750046. http://dx.doi.org/10.1142/s0218127417500468.
Pełny tekst źródłaNikhil Khandare. "CLS-SE: Continuous Location Sharing Using Geffe Generator Based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 302–21. https://doi.org/10.52783/anvi.v28.4219.
Pełny tekst źródłaNikhil Khandare. "CLS-SE: Continuous Location Sharing using Geffe Generator based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 7s (2025): 257–76. https://doi.org/10.52783/anvi.v28.4502.
Pełny tekst źródłaMursidah, Ichsani, Suryadi MT, Sarifuddin Madenda, and Suryadi Harmanto. "Implementation of MS Circle Map in Digital Image Encryption." Applied Sciences 15, no. 13 (2025): 6998. https://doi.org/10.3390/app15136998.
Pełny tekst źródłaZHANG, Xiaoyan, Qichun WANG, Bin WANG, and Haibin KAN. "A Constructive Method of Algebraic Attack with Less Keystream Bits." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 10 (2011): 2059–62. http://dx.doi.org/10.1587/transfun.e94.a.2059.
Pełny tekst źródłaAwad, Wasan Shaker. "Finding Linear Equivalence of Keystream Generators Using Genetic Simulated Annealing." Information Technology Journal 7, no. 3 (2008): 541–44. http://dx.doi.org/10.3923/itj.2008.541.544.
Pełny tekst źródłaGolic, J. D., and S. V. Petrovic. "Correlation attacks on clock-controlled shift registers in keystream generators." IEEE Transactions on Computers 45, no. 4 (1996): 482–86. http://dx.doi.org/10.1109/12.494106.
Pełny tekst źródła