Analysis and design of stream ciphers
Analysis and design of stream ciphers
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Parallel stream cipher for secure high-speed communications
Signal Processing
The LILI-II Keystream Generator
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
PingPong-128, A New Stream Cipher for Ubiquitous Application
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Dragon: a fast word based stream cipher
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A study on efficient OTP generation using stream cipher with random digit
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
On the algebraic attack against summation type keystream generators
International Journal of Information and Computer Security
Hi-index | 0.00 |
An intelligent security agent for a reliable cipher system using a PingPong cipher is proposed. The system contains a security agent for security managements and services. The agent includes an intelligent selection of many security features: encryption processing speeds, encryption methods, encryption algorithms, synchronization methods, network interfaces, user authentications, security-bit levels, the size of synchronization patterns, etc. Furthermore, encryption algorithms with a PingPong-256, -192 and -128 for data confidentiality and a synchronization generator and detector with a SYNPAT-128, -112, -96, -80, and -64 for system stabilization are designed and analyzed.