Bit Independence Criterion Extended to Stream Ciphers
暂无分享,去创建一个
Guillermo Sosa-Gómez | Omar Rojas | Evaristo José Madarro-Capó | Carlos Miguel Legón-Pérez | Raisa Socorro-Llanes
[1] Chungath Srinivasan,et al. Measuring Diffusion in Stream Ciphers using Statistical Testing Methods , 2012 .
[2] Mitsuru Matsui. Key Collisions of the RC4 Stream Cipher , 2009, FSE.
[3] Sergio Verdú,et al. Empirical Estimation of Information Measures: A Literature Guide , 2019, Entropy.
[4] Atsuko Miyaji,et al. How to Find Short RC4 Colliding Key Pairs , 2011, ISC.
[5] Ashish Dhiman,et al. Secure Portable Storage Drive: Secure Information Storage , 2018, Communications in Computer and Information Science.
[6] Tariq Shah,et al. A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes , 2019, Cryptogr..
[7] José María Sierra,et al. The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..
[8] Donald E. Knuth,et al. The Art of Computer Programming, Vol. 3: Sorting and Searching , 1974 .
[9] M. A. Ivanov,et al. Possible Modifications of RC4 Stream Cipher , 2020 .
[10] Brahmjit Singh,et al. Optimization of the Security-Performance Tradeoff in RC4 Encryption Algorithm , 2016, Wireless Personal Communications.
[11] Goutam Paul,et al. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 , 2008, FSE.
[12] Stefania Loredana Nita,et al. Security and Cryptographic Challenges for Authentication Based on Biometrics Data , 2018, Cryptogr..
[13] Darshana Upadhya,et al. Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers , 2017 .
[14] Octavio Páez Osuna,et al. Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers , 2020, EAI Endorsed Trans. Energy Web.
[15] A. Hutson. A robust Pearson correlation test for a general point null using a surrogate bootstrap distribution , 2019, PloS one.
[16] Pierre L'Ecuyer,et al. TestU01: A C library for empirical testing of random number generators , 2006, TOMS.
[17] Javaid A. Sheikh,et al. Information hiding in edges: A high capacity information hiding technique using hybrid edge detection , 2016, Multimedia Tools and Applications.
[18] Bin Zhang,et al. Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha , 2012, ICISC.
[19] Manoj Tyagi,et al. Effective Data Storage Security with Efficient Computing in Cloud , 2018 .
[20] Willi Meier,et al. New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 , 2013, AFRICACRYPT.
[21] Cristina-Loredana Duta,et al. Randomness Evaluation Framework of Cryptographic Algorithms , 2014 .
[22] V. Kamakshi Prasad,et al. Performance and Statistical Analysis of Stream ciphers in GSM Communications , 2020 .
[23] Omar Rojas,et al. Measuring Independence between Statistical Randomness Tests by Mutual Information , 2020, Entropy.
[24] Melek D. Yücel,et al. Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .
[25] Prasanna Raghaw Mishra,et al. Generalized Avalanche Test for Stream Cipher Analysis , 2011, InfoSecHiComNet.
[26] Tariq Shah,et al. S-box on subgroup of Galois field based on linear fractional transformation , 2017 .
[27] L. M. Jenila Livingston,et al. A Comprehensive Survey on SSL/ TLS and their Vulnerabilities , 2016 .
[28] Peter A. Hancock,et al. On the Design of Time , 2018 .
[29] E. Soundararajan,et al. Performance Analysis of Security Algorithms , 2020 .
[30] Poonam Jindal,et al. Modified RC4 Variants and Their Performance Analysis , 2019 .
[31] Alexandr Kuznetsov,et al. The research of modern stream ciphers , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[32] E. J. Madarro Capó,et al. Evaluation of input — output statistical dependence PRNGs by SAC , 2016, 2016 International Conference on Software Process Improvement (CIMPS).
[33] Khurram Khurshid,et al. Performance Evaluation of Stream Ciphers for Efficient and Quick Security of Satellite Images , 2019, International Journal of Signal Processing Systems.