How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
One-way functions and Pseudorandom generators
Combinatorica - Theory of Computing
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
On the generation of cryptographically strong pseudorandom sequences
ACM Transactions on Computer Systems (TOCS)
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Handbook of Applied Cryptography
Handbook of Applied Cryptography
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
On the existence of pseudorandom generators
SFCS '88 Proceedings of the 29th Annual Symposium on Foundations of Computer Science
SFCS '89 Proceedings of the 30th Annual Symposium on Foundations of Computer Science
New hash functions for message authentication
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
The design of a new hardware efficient stream cipher based on hash functions and its analysis are presented in this paper. Since the output keystream is a hashed version of the secret key, the security of the cipher directly depends on the one-wayness of the hash function. With the advance of wireless communication technology, mobile communications has become more convenient than ever. However, due to the openness of wireless communication, it is difficult to protect the privacy between communicating parties. Since stream ciphers are less expensive in hardware, they are widely used for confidentiality in wireless sensor networks, WEP and GSM networks. Hash functions are generally employed in ad-hoc networks for integrity verification and authentication of data and control packets. Most of the available hash function based stream ciphers are optimised for software efficiency. So a stream cipher that has least hardware complexity, less power consumption and high security gains importance in these days.