Analysis and design of stream ciphers
Analysis and design of stream ciphers
Introduction to finite fields and their applications
Introduction to finite fields and their applications
A simple unpredictable pseudo random number generator
SIAM Journal on Computing
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
A secure remote database backup system
AIKED'06 Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
Lightweight peer-to-peer secure multi-party VoIP protocol
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Silence detection in secure P2P VoIP multiconferencing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A pseudorandom bit generator based on block upper triangular matrices
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A new public key cryptosystem based on matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Fast pseudorandom generator based on packed matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
WSEAS Transactions on Computers
Simulation study of the functioning of LFSR for grade 4 irreducible polynomials
SEPADS'09 Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems
Hi-index | 0.00 |
Most cryptographic services and information security protocols require a dependable source of random data; pseudorandom generators are convenient and efficient for this application working as one of the basic foundation blocks on which to build the required security infrastructure. We propose a modification of a previously published matricial pseudorandom generator that significantly improves performance and security by using word packed matrices and modifying key scheduling and bit extraction schemes. The resulting generator is then successfully compared to world class standards.