A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
A novel family of keystream generators is proposed employing a linear cellular automata over GF(q) with time varying transition rule. The analysis indicates that the generator, which is the general member of the family, reaches standard minimal security conditions (large period and good statistical properties) and that it is secure against all known attacks. An important feature of the proposed generators is that they are compact and suitable for high speed applications.
- 社団法人電子情報通信学会の論文
- 1999-01-25
著者
-
IMAI Hideki
University of Tokyo
-
Mihaljevic M
Academy Of Science And Arts Kneza Mihaila
-
Mihaljevic Miodrag
Academy Of Science And Arts Kneza Mihaila
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- How to Protect Peer-to-Peer Online Games from Cheats
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Multilevel Coded 16-QAM Modulation with Multistage Decoding and Unequal Error Protection
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
- A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
- Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems(Wireless Communication Technology)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- New Short Signature Scheme without Random Oracles
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)