The operational disadvantages of perfectly secure cipher systems has led to the development of practically secure stream cipher systems. The security of such cipher systems depend on the strength of the keystream. In order to examine the strength of a sequence two different types of criteria are considered. Statistical tests, are designed to assess how a sequence with a particular property behaves randomly. Complexity measures, are applied to determine the complexity, or equivalently the unpredictability of a sequence. Sequences obtained by LFSR are considered as building blocks of pseudo-random (PR) sequence generators. Transformations on the decimal expansion of irrational numbers is an alternative method for generating PR sequences, whic...
Many of the key stream generators which are used in practice are LFSR-based in the sense that they p...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
True random numbers have gained wide applications in many areas like: com- puter simulation, Mo...
The most effective cryptographic algorithm has more randomness in the numbers a generator generates,...
The increasing privacy risks associated with the recent growth of multimedia streaming applications...
The increasing privacy risks associated with the recent growth of multimedia streaming applications...
With the increasing reliance on technology, it has become crucial to secure every aspect of online i...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Random numbers (in one sense or another) have applications in computer simulation, Monte Carlo integ...
Random numbers (in one sense or another) have applications in computer simulation, Monte Carlo integ...
Random key bit generators are used in statistically secured stream ciphers. In stream ciphers pseudo...
Abstract. Cryptographic primitives such as secure hash functions (e.g., SHA1, SHA2, and SHA3) and sy...
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated...
Pseudo-random sequences are ubiquitous in modern electronics and information technology. High speed ...
Many of the key stream generators which are used in practice are LFSR-based in the sense that they p...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
True random numbers have gained wide applications in many areas like: com- puter simulation, Mo...
The most effective cryptographic algorithm has more randomness in the numbers a generator generates,...
The increasing privacy risks associated with the recent growth of multimedia streaming applications...
The increasing privacy risks associated with the recent growth of multimedia streaming applications...
With the increasing reliance on technology, it has become crucial to secure every aspect of online i...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Random numbers (in one sense or another) have applications in computer simulation, Monte Carlo integ...
Random numbers (in one sense or another) have applications in computer simulation, Monte Carlo integ...
Random key bit generators are used in statistically secured stream ciphers. In stream ciphers pseudo...
Abstract. Cryptographic primitives such as secure hash functions (e.g., SHA1, SHA2, and SHA3) and sy...
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated...
Pseudo-random sequences are ubiquitous in modern electronics and information technology. High speed ...
Many of the key stream generators which are used in practice are LFSR-based in the sense that they p...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
True random numbers have gained wide applications in many areas like: com- puter simulation, Mo...