共 50 条
- [12] On the Security of Designing a Cellular Automata Based Stream Cipher INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 406 - 413
- [13] Tight Security Bounds for Generic Stream Cipher Constructions SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 335 - 364
- [14] Application of Stream Cipher and Hash Function in Network Security PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 429 - 435
- [15] Physical Layer Security Using Stream Cipher For LTE 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
- [16] A chaotic cipher Mmohocc and its security analysis MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
- [18] Fault Analysis on Stream Cipher MUGI INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 420 - +
- [19] Stream Cipher-Based Hash Function and Its Security E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
- [20] Strumok Stream Cipher: Spesification and Basic Properties 2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 59 - 62