Secure Gamma Generation For Stream Cipher based on Fuzzy Logic
暂无分享,去创建一个
[1] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[2] W. G. Chambers. Clock-controlled shift registers in binary sequence generators , 1988 .
[3] Tomsk Russia Radioelectronics,et al. Dynamic-signature-based user authentication using a fuzzy classifier , 2018 .
[4] Petr Hájek,et al. Handbook of mathematical fuzzy logic , 2011 .
[5] I. A. Hodashinsky,et al. Bagged ensemble of fuzzy classifiers and feature selection for handwritten signature verification , 2019 .
[6] Anne Canteaut. Linear Feedback Shift Register , 2005, Encyclopedia of Cryptography and Security.
[7] Hamijah Mohd Rahman,et al. Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers , 2018, SCDM.
[8] I. Anikin,et al. Pseudo-random number generator based on fuzzy logic , 2016, 2016 International Siberian Conference on Control and Communications (SIBCON).
[9] Fred Piper,et al. Stream Ciphers , 1982, EUROCRYPT.
[10] Primitive polynomials selection method for pseudo-random number generator , 2018 .
[11] Lotfi A. Zadeh. Linguistic Variables and Approximate Reasoning , 1982 .
[12] R. A. Rueppel. Analysis and Design of Stream Ciphers , 2012 .
[14] Craig Bauer,et al. Secret History: The Story of Cryptology , 2013 .
[15] Henk C. A. Van Tilborg,et al. Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial , 1999 .
[16] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[17] Harald Niederreiter,et al. On the expected value of the linear complexity and the k-error linear complexity ofperiodic sequences , 2002, IEEE Trans. Inf. Theory.
[18] Martin Fleury,et al. Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams , 2020, Journal of Ambient Intelligence and Humanized Computing.
[19] Dimitrios Kagaris,et al. LFSR characteristic polynomial and phase shifter computation for two-dimensional test set generation , 2017, 2017 18th IEEE Latin American Test Symposium (LATS).
[20] Goutam Paul,et al. RC4 Stream Cipher and Its Variants , 2011 .
[21] Thumrongrat Amornraksa,et al. Digital Image Watermarking Based on Fuzzy Image Filter , 2018 .
[22] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[23] R. V. Meshcheryakov,et al. A review of methods of embedding information in digital objects for security in the internet of things Oбзop neToдoв вcTpaiвaнiya iнфopnaцii в цiфpoвыe oбъekTы длya oбecпeчeнiya бeзoпacнocTi в «iнTepнeTe вeщeй» , 2019 .
[24] Henry Beker,et al. Cipher Systems: The Protection of Communications , 1982 .
[25] Bart Preneel,et al. A New Keystream Generator MUGI , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..