BISHOI, Susil Kumar a Václav MATYÁŠ. MRMM-Based Keystream Generators for Information Security. In Gountia, D., Dalei, D.K., Mishra, S. (eds). Information Technology Security. Singapore: Springer, Singapore, 2024, s. 209-233. Springer Tracts in Electrical and Electronics Engineering. ISBN 978-981-97-0406-4. Dostupné z: https://dx.doi.org/10.1007/978-981-97-0407-1_9. |
Další formáty:
BibTeX
LaTeX
RIS
@inbook{2391179, author = {Bishoi, Susil Kumar and Matyáš, Václav}, address = {Singapore}, booktitle = {Information Technology Security}, doi = {http://dx.doi.org/10.1007/978-981-97-0407-1_9}, editor = {Gountia, D., Dalei, D.K., Mishra, S. (eds)}, keywords = {Alternative step generators; Cascade generator; Linear complexity; LFG; Multiple-recursive matrix method; Shrinking generator; Stream cipher}, howpublished = {tištěná verze "print"}, language = {eng}, location = {Singapore}, isbn = {978-981-97-0406-4}, pages = {209-233}, publisher = {Springer, Singapore}, title = {MRMM-Based Keystream Generators for Information Security}, url = {https://link.springer.com/chapter/10.1007/978-981-97-0407-1_9}, year = {2024} }
TY - CHAP ID - 2391179 AU - Bishoi, Susil Kumar - Matyáš, Václav PY - 2024 TI - MRMM-Based Keystream Generators for Information Security VL - Springer Tracts in Electrical and Electronics Engineering PB - Springer, Singapore CY - Singapore SN - 9789819704064 KW - Alternative step generators KW - Cascade generator KW - Linear complexity KW - LFG KW - Multiple-recursive matrix method KW - Shrinking generator KW - Stream cipher UR - https://link.springer.com/chapter/10.1007/978-981-97-0407-1_9 N2 - The central theme of a stream cipher is a keystream generator that produces a pseudorandom bit sequence and is popularly used to ensure privacy over a communication channel. The word-based linear feedback shift register also known as the multiple recursive matrix method (MRMM) is attractive as it possesses most of the randomness properties like linear feedback shift register. It also takes advantage of modern word-based processors and thus increases the throughput. The major drawback of MRMM is that it has low linear complexity. In order to address the low linear complexity drawback in MRMM, the concept of several bit-oriented generators is extended to MRMMs. For this, a generalized form of the feedback function for word-oriented feedback shift registers is discussed, and then study MRMM as a special case. ER -
BISHOI, Susil Kumar a Václav MATYÁŠ. MRMM-Based Keystream Generators for Information Security. In Gountia, D., Dalei, D.K., Mishra, S. (eds). \textit{Information Technology Security}. Singapore: Springer, Singapore, 2024, s.~209-233. Springer Tracts in Electrical and Electronics Engineering. ISBN~978-981-97-0406-4. Dostupné z: https://dx.doi.org/10.1007/978-981-97-0407-1\_{}9.
|