The purpose of this thesis is to analyze the cryptographic properties of a pseudorandom bit generator that combines Blum Blum Shub and linear feedback shift register sequences using a shrinking generator configuration. We sought to answer the questions: (1) What are the strengths and weaknesses of this type of combiner? (2) What constraints must be placed on the input parameters to ensure good cryptographic properties of the output sequence? We generated sequences using variations of this combiner. We then evaluated their cryptographic suitability with the National Institute of Standards and Technology (NIST) statistical test suite. We identified lower bounds on the input parameters to increase the probability that the combiner would perfo...
The nonlinear feedback shift registers of the second order inare considered, because based on them i...
Abstract — Non-Linear Feedback Shift Registers (NLFSRs) have been proposed as an alternative to Line...
Abstract. Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive-or s...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
We investigate a cryptographically secure pseudorandom number generator based on a Linear Feedback S...
Blum-Blum-Shub (BBS) is a (probabilistically) secure pseudorandom bit/number generator which outputs...
This communication proposes a simplified model of pseudorandom bit generator, based on two Chirikov ...
Abstract:- This paper presents a new method for designing effective nonlinear pseudorandom bits gene...
Cryptography is widely used by everybody in day-to-day activities. Many cryptographic algorithms re...
Cryptography forms the backbone of modern secure communication. Many different methods are available...
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high co...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
The nonlinear feedback shift registers of the second order inare considered, because based on them i...
Abstract — Non-Linear Feedback Shift Registers (NLFSRs) have been proposed as an alternative to Line...
Abstract. Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive-or s...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
We investigate a cryptographically secure pseudorandom number generator based on a Linear Feedback S...
Blum-Blum-Shub (BBS) is a (probabilistically) secure pseudorandom bit/number generator which outputs...
This communication proposes a simplified model of pseudorandom bit generator, based on two Chirikov ...
Abstract:- This paper presents a new method for designing effective nonlinear pseudorandom bits gene...
Cryptography is widely used by everybody in day-to-day activities. Many cryptographic algorithms re...
Cryptography forms the backbone of modern secure communication. Many different methods are available...
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high co...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
The nonlinear feedback shift registers of the second order inare considered, because based on them i...
Abstract — Non-Linear Feedback Shift Registers (NLFSRs) have been proposed as an alternative to Line...
Abstract. Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive-or s...