PSEUDORANDOM BIT GENERATORS IN STREAM-CIPHER CRYPTOGRAPHY

被引:54
|
作者
ZENG, KC
YANG, CH
WEI, DY
RAO, TRN
机构
关键词
D O I
10.1109/2.67207
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The information age lends new dimensions to the art of cryptography. Techniques for encryption, decryption, and fending off attacks from intruders provide the only protection of sensitive data.
引用
收藏
页码:8 / 17
页数:10
相关论文
共 50 条
  • [1] Design of chaotic pseudo-random bit generator and its applications in stream-cipher cryptography
    Wang, Xing-Yuan
    Wang, Xiao-Juan
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2008, 19 (05): : 813 - 820
  • [2] Graphic cryptography with pseudorandom bit generators and cellular automata
    Marañón, GA
    Encinas, LH
    Encinas, AH
    del Rey, AM
    Sánchez, GR
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2003, 2773 : 1207 - 1214
  • [3] Efficient stream-cipher for GSM networks
    Nazar, M
    Promjiraprawat, K
    Piyatamrong, B
    Bunyatnoparat, P
    CIC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2003, : 200 - 204
  • [4] Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves
    Payingat, Jilna
    Pattathil, Deepthi P.
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [5] LARGE PRIMES IN STREAM CIPHER CRYPTOGRAPHY
    ZENG, KC
    YANG, CH
    RAO, TRN
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 194 - 205
  • [6] Pseudorandom Bit Generators That Fool Modular Sums
    Lovett, Shachar
    Reingold, Omer
    Trevisan, Luca
    Vadhan, Salil
    APPROXIMATION, RANDOMIZATION, AND COMBINATORIAL OPTIMIZATION: ALGORITHMS AND TECHNIQUES, 2009, 5687 : 615 - +
  • [7] Statistical complexity measure of pseudorandom bit generators
    González, CM
    Larrondo, HA
    Rosso, OA
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 354 : 281 - 300
  • [8] Robust Chaos-based Stream-Cipher for Secure Public Communication Channels
    Jallouli, Ons
    El Assad, Safwan
    Chetto, Maryline
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 23 - 26
  • [9] Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network
    Hwang, Tzonelih
    Gope, Prosanta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (07) : 667 - 679
  • [10] On Applying Pseudorandom Number Generators in Quantum Cryptography with Coherent States
    Avanesov, A. S.
    Kronberg, D. A.
    FIFTH INTERNATIONAL CONFERENCE ON QUANTUM TECHNOLOGIES (ICQT-2019), 2020, 2241