메뉴 건너뛰기




Volumn 28, Issue 3-4, 2009, Pages 229-241

Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions

Author keywords

Hash function; LFSR Toeplitz hash; Polynomial modular division circuit; Pseudorandom number generator; Stream cipher

Indexed keywords

COMPUTER HARDWARE DESCRIPTION LANGUAGES; DESIGN; ENCODING (SYMBOLS); NUMBER THEORY; POLYNOMIAL APPROXIMATION; SHIFT REGISTERS;

EID: 63049097124     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.11.006     Document Type: Article
Times cited : (36)

References (23)
  • 3
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Blum M., and Micali S. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing 13 4 (1984) 850-864
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 4
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • Carter J.L., and Wegman M.N. Universal classes of hash functions. JCSS 18 (1979) 143-154
    • (1979) JCSS , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 5
    • 84974670663 scopus 로고
    • The Shrinking Generator, Advances in Cryptology - Crypto '93
    • Springer-Verlag;
    • Coppersmith D, Krawczyk H, Mansour Y. The Shrinking Generator, Advances in Cryptology - Crypto '93, LNCS, vol. 773. Springer-Verlag; 1994. p. 22-39.
    • (1994) LNCS , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 7
    • 35248859228 scopus 로고    scopus 로고
    • Predicting the shrinking generator with fixed connections
    • EUROCRYPT 2003, Springer-Verlag
    • Ekdahl P., Meier W., and Johannson T. Predicting the shrinking generator with fixed connections. EUROCRYPT 2003. Lecture notes in computer science (1999), Springer-Verlag 330-334
    • (1999) Lecture notes in computer science , pp. 330-334
    • Ekdahl, P.1    Meier, W.2    Johannson, T.3
  • 10
    • 33748341920 scopus 로고    scopus 로고
    • Cryptographic hash functions and low-power techniques for embedded hardware
    • Huang A.L., and Penzhorn W.T. Cryptographic hash functions and low-power techniques for embedded hardware. IEEE Conference Proceedings 4 (2005) 1789-1794
    • (2005) IEEE Conference Proceedings , vol.4 , pp. 1789-1794
    • Huang, A.L.1    Penzhorn, W.T.2
  • 13
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Advances in cryptology - crypto'94, Springer-Verlag
    • Krawczyk H. LFSR-based hashing and authentication. Advances in cryptology - crypto'94. Lecture notes in computer science vol. 839 (1994), Springer-Verlag 129-139
    • (1994) Lecture notes in computer science , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 14
    • 33745650569 scopus 로고
    • Fast correlation attacks on stream ciphers
    • Advances in cryptology, EUROCRYPT88, Springer-Verlag
    • Meier W., and Staffelbach O. Fast correlation attacks on stream ciphers. Advances in cryptology, EUROCRYPT88. Lecture notes in computer science vol. 330 (1988), Springer-Verlag 301-314
    • (1988) Lecture notes in computer science , vol.330 , pp. 301-314
    • Meier, W.1    Staffelbach, O.2
  • 16
    • 35048823393 scopus 로고    scopus 로고
    • Improved linear consistency attack on irregular clocked keystream generators
    • Fast software encryption-FSE'2004, Springer-Verlag
    • Molland H. Improved linear consistency attack on irregular clocked keystream generators. Fast software encryption-FSE'2004. LNCS vol. 3017 (2004), Springer-Verlag 109-126
    • (2004) LNCS , vol.3017 , pp. 109-126
    • Molland, H.1
  • 17
    • 63049112837 scopus 로고    scopus 로고
    • A statistical suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, May 15; 2001.
    • A statistical suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, May 15; 2001.
  • 20
    • 38049015677 scopus 로고
    • On the generation of cryptographically strong pseudorandom sequences
    • Shamir A. On the generation of cryptographically strong pseudorandom sequences. ACM Transaction on Computer Systems 1 1 (1983) 38-44
    • (1983) ACM Transaction on Computer Systems , vol.1 , Issue.1 , pp. 38-44
    • Shamir, A.1
  • 23
    • 38949103410 scopus 로고    scopus 로고
    • Research on a novel hashing stream cipher
    • Zhang Y., Niu X., Li J., and Li C. Research on a novel hashing stream cipher. IEEE Conference Proceedings 2 3-6 (2006) 1339-1344
    • (2006) IEEE Conference Proceedings , vol.2 , Issue.3-6 , pp. 1339-1344
    • Zhang, Y.1    Niu, X.2    Li, J.3    Li, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.