Articles with "keystream" as a keyword



Photo by scottwebb from unsplash

On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream

Sign Up to like & get
recommendations!
Published in 2017 at "EURASIP Journal on Advances in Signal Processing"

DOI: 10.1186/s13634-017-0508-6

Abstract: The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with… read more here.

Keywords: keystream; unitary sensing; security; partial unitary ... See more keywords
Photo from wikipedia

Performance and Statistical Analysis of Stream ciphers in GSM Communications

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of communications software and systems"

DOI: 10.24138/jcomss.v16i1.892

Abstract: For a stream cipher to be secure, the keystream generated by it should be uniformly random with parameter 1/2. Statistical tests check whether the given sequence follow a certain probability distribution. In this paper, we… read more here.

Keywords: stream ciphers; stream; statistical analysis; keystream ... See more keywords
Photo by adigold1 from unsplash

On the Statistical Analysis of ZUC, Espresso and Grain v1

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Computing"

DOI: 10.47839/ijc.20.3.2284

Abstract: A stream cipher generates long keystream to be XORed with plaintext to produce ciphertext. A stream cipher is said to be secure if the keystream that it produces is consistently random. One of the ways by which we can analyze stream ciphers… read more here.

Keywords: zuc espresso; keystream; stream; espresso grain ... See more keywords