Bit Independence Criterion Extended to Stream Ciphers

[1]  Chungath Srinivasan,et al.  Measuring Diffusion in Stream Ciphers using Statistical Testing Methods , 2012 .

[2]  Mitsuru Matsui Key Collisions of the RC4 Stream Cipher , 2009, FSE.

[3]  Sergio Verdú,et al.  Empirical Estimation of Information Measures: A Literature Guide , 2019, Entropy.

[4]  Atsuko Miyaji,et al.  How to Find Short RC4 Colliding Key Pairs , 2011, ISC.

[5]  Ashish Dhiman,et al.  Secure Portable Storage Drive: Secure Information Storage , 2018, Communications in Computer and Information Science.

[6]  Tariq Shah,et al.  A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes , 2019, Cryptogr..

[7]  José María Sierra,et al.  The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..

[8]  Donald E. Knuth,et al.  The Art of Computer Programming, Vol. 3: Sorting and Searching , 1974 .

[9]  M. A. Ivanov,et al.  Possible Modifications of RC4 Stream Cipher , 2020 .

[10]  Brahmjit Singh,et al.  Optimization of the Security-Performance Tradeoff in RC4 Encryption Algorithm , 2016, Wireless Personal Communications.

[11]  Goutam Paul,et al.  New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 , 2008, FSE.

[12]  Stefania Loredana Nita,et al.  Security and Cryptographic Challenges for Authentication Based on Biometrics Data , 2018, Cryptogr..

[13]  Darshana Upadhya,et al.  Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers , 2017 .

[14]  Octavio Páez Osuna,et al.  Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers , 2020, EAI Endorsed Trans. Energy Web.

[15]  A. Hutson A robust Pearson correlation test for a general point null using a surrogate bootstrap distribution , 2019, PloS one.

[16]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[17]  Javaid A. Sheikh,et al.  Information hiding in edges: A high capacity information hiding technique using hybrid edge detection , 2016, Multimedia Tools and Applications.

[18]  Bin Zhang,et al.  Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha , 2012, ICISC.

[19]  Manoj Tyagi,et al.  Effective Data Storage Security with Efficient Computing in Cloud , 2018 .

[20]  Willi Meier,et al.  New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 , 2013, AFRICACRYPT.

[21]  Cristina-Loredana Duta,et al.  Randomness Evaluation Framework of Cryptographic Algorithms , 2014 .

[22]  V. Kamakshi Prasad,et al.  Performance and Statistical Analysis of Stream ciphers in GSM Communications , 2020 .

[23]  Omar Rojas,et al.  Measuring Independence between Statistical Randomness Tests by Mutual Information , 2020, Entropy.

[24]  Melek D. Yücel,et al.  Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .

[25]  Prasanna Raghaw Mishra,et al.  Generalized Avalanche Test for Stream Cipher Analysis , 2011, InfoSecHiComNet.

[26]  Tariq Shah,et al.  S-box on subgroup of Galois field based on linear fractional transformation , 2017 .

[27]  L. M. Jenila Livingston,et al.  A Comprehensive Survey on SSL/ TLS and their Vulnerabilities , 2016 .

[28]  Peter A. Hancock,et al.  On the Design of Time , 2018 .

[29]  E. Soundararajan,et al.  Performance Analysis of Security Algorithms , 2020 .

[30]  Poonam Jindal,et al.  Modified RC4 Variants and Their Performance Analysis , 2019 .

[31]  Alexandr Kuznetsov,et al.  The research of modern stream ciphers , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[32]  E. J. Madarro Capó,et al.  Evaluation of input — output statistical dependence PRNGs by SAC , 2016, 2016 International Conference on Software Process Improvement (CIMPS).

[33]  Khurram Khurshid,et al.  Performance Evaluation of Stream Ciphers for Efficient and Quick Security of Satellite Images , 2019, International Journal of Signal Processing Systems.