Narrow your search
Listing 1 - 7 of 7
Sort by
Stream ciphers and number theory
Authors: --- ---
ISBN: 9780444516312 044451631X 9780080541839 0080541836 1306133068 Year: 2004 Publisher: Boston Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researc

Stream ciphers and number theory
Authors: --- ---
ISBN: 9780444516312 044451631X 9780080541839 0080541836 1306133068 Year: 2004 Publisher: Amsterdam Boston Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researc


Book
Stream Ciphers in Modern Real-time IT Systems
Authors: --- --- --- --- --- et al.
ISBN: 9783030797706 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers.


Book
Stream ciphers in modern real-time IT systems : analysis, design and comparative studies
Author:
ISBN: 3030797694 3030797708 Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers.


Book
Design and cryptanalysis of ZUC : a stream cipher in mobile telephony
Authors: --- ---
ISBN: 9813348828 981334881X Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.


Book
New stream cipher designs : the eSTREAM finalists
Authors: ---
ISBN: 9783540683506 354068350X 3540683518 Year: 2008 Volume: 4986 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be either very fast in software or very resource-efficient in hardware. Algorithm designers were invited to submit new stream cipher proposals to eSTREAM, and 34 candidates were proposed from around the world. Over the following years the submissions were assessed with regard to both security and practicality by the cryptographic community, and the results were presented at major conferences and specialized workshops dedicated to the state of the art of stream ciphers. This volume describes the most successful of the submitted designs and, over 16 chapters, provides full specifications of the ciphers that reached the final phase of the eSTREAM project. The book is rounded off by two implementation surveys covering both the software- and the hardware-oriented finalists.--

Keywords

Computer security --- Data encryption (Computer science) --- Coding theory --- Sécurité informatique --- Chiffrement (Informatique) --- Codage --- eSTREAM (Project) --- Stream ciphers --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Stream ciphers. --- Coding theory. --- Sécurité informatique --- EPUB-LIV-FT SPRINGER-B --- State ciphers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer programming. --- Data structures (Computer science). --- Computer Science. --- Programming Techniques. --- Data Structures, Cryptology and Information Theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Electronic computer programming --- Programming (Electronic computers) --- Informatics --- Science --- Programming --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Ciphers --- Cryptography --- Data protection --- Security systems --- Hacking --- Data structures (Computer scienc. --- Data Structures and Information Theory.

The stability theory of stream ciphers
Authors: --- ---
ISBN: 0387549730 3540549730 3540466266 Year: 1991 Volume: 561 Publisher: Berlin New York Springer-Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.

Keywords

Bedieningstheorie --- Chiffres --- Cijfers --- Ciphers --- Commande [Theorie de la ] --- Control theory --- Stabiliteit --- Stability --- Stabilité --- Chiffres (Cryptographie) --- Théorie de la commande --- 681.3*E3 --- Dynamics --- Mechanics --- Motion --- Vibration --- Benjamin-Feir instability --- Equilibrium --- Machine theory --- Codes --- Contractions --- Signs and symbols --- Symbolism --- Abbreviations --- Code names --- Cryptography --- Writing --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Théorie de la commande --- Stabilité --- Stream ciphers --- State ciphers --- Control theory. --- Stability. --- Ciphers. --- Data encryption (Computer science). --- Computer security. --- Operating systems (Computers). --- Numerical analysis. --- Cryptology. --- Systems and Data Security. --- Operating Systems. --- Numerical Analysis. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Mathematical analysis --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Security measures

Listing 1 - 7 of 7
Sort by