메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 1339-1344

Research on a novel hashing stream cipher

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; FUNCTION EVALUATION; ITERATIVE METHODS; RANDOM PROCESSES; ROBUSTNESS (CONTROL SYSTEMS);

EID: 38949103410     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCIAS.2006.295277     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 1
    • 38349035287 scopus 로고
    • Security Models and Notions for Stream Ciphers
    • C. Mitchell, ed, Oxford: Clarendon Press
    • R.A. Rueppel, "Security Models and Notions for Stream Ciphers", Cryptography and Coding II, C. Mitchell, ed., Oxford: Clarendon Press, 1992.
    • (1992) Cryptography and Coding II
    • Rueppel, R.A.1
  • 3
    • 38949131401 scopus 로고    scopus 로고
    • Bruce Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, Wiley Computer Publishing, John Wiley & Sons, 01/01/1996.
    • Bruce Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, Wiley Computer Publishing, John Wiley & Sons, 01/01/1996.
  • 4
    • 84937740421 scopus 로고
    • Shift-Register Synthesis and BCH Decoding
    • Jan
    • J.L. Massey, "Shift-Register Synthesis and BCH Decoding", IEEE Transactions on Information Theory, v. IT-15, n. 1, Jan 1969, pp. 122-127.
    • (1969) IEEE Transactions on Information Theory , vol.IT-15 , Issue.1 , pp. 122-127
    • Massey, J.L.1
  • 5
    • 38949113090 scopus 로고    scopus 로고
    • The Misuse of RC4 in Microsoft Word and Excel
    • Singapore
    • Hongjun Wu, "The Misuse of RC4 in Microsoft Word and Excel", Institute for Infocomm Research, Singapore.
    • Institute for Infocomm Research
    • Hongjun, W.1
  • 6
    • 38949203978 scopus 로고    scopus 로고
    • S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, Canada, Aug. 2001.
    • S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, Canada, Aug. 2001.
  • 7
    • 38949176938 scopus 로고    scopus 로고
    • Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP)
    • A, Month 20YY
    • ADAM STUBBLEFIELD, JOHN IOANNIDIS, AVIEL D. RUBIN, A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP), ACM Journal Name, Vol. V, No. N, Month 20YY.
    • ACM Journal Name , vol.5
    • STUBBLEFIELD, A.1    IOANNIDIS, J.2    RUBIN, A.D.3
  • 9
    • 38949121864 scopus 로고    scopus 로고
    • A Synchronous Stream Cipher from Hash Functions, Obsidis (www.obsidis.org), ZDNET, secguru.com
    • Feb 17th
    • Angelo P. E. Rosiello, Roberto Carrozzo, ARC: A Synchronous Stream Cipher from Hash Functions, Obsidis (www.obsidis.org), ZDNET, secguru.com, Feb 17th 2006.
    • (2006)
    • Angelo, P.1    Rosiello, E.2    Roberto Carrozzo, A.R.C.3
  • 10
    • 38949113942 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 180-2, August
    • SECURE HASH STANDARD, Federal Information Processing Standards Publication 180-2, August 2002.
    • (2002)
    • HASH STANDARD, S.1
  • 12
    • 38949205119 scopus 로고    scopus 로고
    • Arani Dasgupta, Analysis of Different Types of Attacks on Stream Ciphers and Evaluation and Security of Stream Ciphers,http://www. securitydocs.com/library/3235, 04/27/2005.
    • Arani Dasgupta, Analysis of Different Types of Attacks on Stream Ciphers and Evaluation and Security of Stream Ciphers,http://www. securitydocs.com/library/3235, 04/27/2005.
  • 13
    • 38949190835 scopus 로고    scopus 로고
    • A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, May 15, 2001
    • A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, May 15, 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.