Keyword : stream cipher


On Design of Robust Lightweight Stream Cipher with Short Internal State
Subhadeep BANIK Takanori ISOBE Masakatu MORII 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 99-109
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
even-mansourlightweightstream ciphershort internal stateTMD tradeoff
 Summary | Full Text:PDF(1MB)

The Crosscorrelation of Binary Interleaved Sequences of Period 4N
Tongjiang YAN Ruixia YUAN Xiao MA 
Publication:   
Publication Date: 2017/11/01
Vol. E100-A  No. 11 ; pp. 2513-2517
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
interleaved sequencecrosscorrelationstream cipher
 Summary | Full Text:PDF(248.5KB)

Analysis and Improvements of the Full Spritz Stream Cipher
Subhadeep BANIK Takanori ISOBE Masakatu MORII 
Publication:   
Publication Date: 2017/06/01
Vol. E100-A  No. 6 ; pp. 1296-1305
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RC4Spritzstream ciphershort-term biaslong-term biasdistinguishing attackplaintext recovery attackstate recovery attack
 Summary | Full Text:PDF(870.2KB)

The Exact Fast Algebraic Immunity of Two Subclasses of the Majority Function
Deng TANG Rong LUO Xiaoni DU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/11/01
Vol. E99-A  No. 11 ; pp. 2084-2088
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipherBoolean functionalgebraic attackfast algebraic immunity
 Summary | Full Text:PDF(113.1KB)

Refined Glimpse Correlations of RC4
Ryoma ITO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1 ; pp. 3-13
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC4stream cipherGlimpse theoremlong-term Glimpse
 Summary | Full Text:PDF(1.1MB)

Linear Complexity over Fq of Generalized Cyclotomic Quaternary Sequences with Period 2p
Minglong QI Shengwu XIONG Jingling YUAN Wenbi RAO Luo ZHONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/07/01
Vol. E98-A  No. 7 ; pp. 1569-1575
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
linear complexitygeneralized cyclotomic sequencesquaternary sequencesstream ciphergenerating polynomial
 Summary | Full Text:PDF(139.9KB)

Balanced Boolean Functions of σƒ>22n+2n+3(n≥4)
Yu ZHOU Lin WANG Weiqiong WANG Xiaoni DU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/06/01
Vol. E98-A  No. 6 ; pp. 1313-1319
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipherBoolean functionsglobal avalanche characteristicsalgebraic immunitybalanced
 Summary | Full Text:PDF(128.9KB)

Autocorrelation of Modified Legendre-Sidelnikov Sequences
Tongjiang YAN Huadong LIU Yuhua SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 771-775
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipherLegendre-Sidelnikov sequenceautocorrelation
 Summary | Full Text:PDF(90.2KB)

Full Plaintext Recovery Attacks on RC4 Using Multiple Biases
Toshihiro OHIGASHI Takanori ISOBE Yuhei WATANABE Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 81-91
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
RC4stream cipherkeystream biasesplaintext recovery attackguess-and-determine attackbroadcast setting
 Summary | Full Text:PDF(945KB)

On the LFSRization of a Class of FCSR Automata
Zhiqiang LIN Lishan KE Dongdai LIN Jian GAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 434-440
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipher2-adic integerl-sequenceFCSRF-FCSRGaolis FCSRsring FCSR
 Summary | Full Text:PDF(266.6KB)

Decomposing Approach for Error Vectors of k-Error Linear Complexity of Certain Periodic Sequences
Ming SU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/07/01
Vol. E97-A  No. 7 ; pp. 1542-1555
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
(k-error) linear complexityerror vectorcounting functionsexpectationstream cipher
 Summary | Full Text:PDF(448.7KB)

Fast Implementation of KCipher-2 for Software and Hardware
Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Tsukasa ISHIGURO Yutaka MIYAKE Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/01/01
Vol. E97-D  No. 1 ; pp. 43-52
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
stream cipherKCipher-2software implementationhardware implementation
 Summary | Full Text:PDF(641.2KB)

Comprehensive Analysis of Initial Keystream Biases of RC4
Takanori ISOBE Toshihiro OHIGASHI Yuhei WATANABE Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 139-151
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
RC4stream cipherkeystream biasesplaintext recovery attackmultiple key distinguisherkey recovery attackbroadcast setting
 Summary | Full Text:PDF(1.3MB)

Some Notes on the Generalized Cyclotomic Binary Sequences of Length 2pm and pm
Tongjiang YAN Xiaoping LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/10/01
Vol. E96-A  No. 10 ; pp. 2049-2051
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipherlinear complexityerror linear complexitycyclotomic sequencestuple distribution
 Summary | Full Text:PDF(78.6KB)

Improved Key Recovery Attack on the BEAN Stream Cipher
Hui WANG Martin HELL Thomas JOHANSSON Martin ÅGREN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1437-1444
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
stream cipherkey recovery attackFCSRBEAN
 Summary | Full Text:PDF(1.1MB) | Errata[Uploaded on July 1,2013]

Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2
Shugo MIKAMI Hirotaka YOSHIDA Dai WATANABE Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/03/01
Vol. E96-A  No. 3 ; pp. 697-704
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
stream cipherEnocoro-128v2side channel analysiscorrelation power analysisthreshold implementation
 Summary | Full Text:PDF(1.3MB)

Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
Jiageng CHEN Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12 ; pp. 2148-2159
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
stream cipherrelated key modelRC4
 Summary | Full Text:PDF(1.2MB)

Computing the k-Error Linear Complexity of q-Ary Sequences with Period 2pn
Zhihua NIU Zhe LI Zhixiong CHEN Tongjiang YAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/09/01
Vol. E95-A  No. 9 ; pp. 1637-1641
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipherperiodic sequencelinear complexityk-error linear complexitygenetic algorithm
 Summary | Full Text:PDF(213.6KB)

Differential Fault Analysis on Stream Cipher MUGI
Junko TAKAHASHI Toshinori FUKUNAGA Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 242-251
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
fault analysisdifferential fault analysis (DFA)stream cipherside-channel analysisMUGI
 Summary | Full Text:PDF(788.8KB)

New Constructions of Binary Sequences with Good Autocorrelation Based on Interleaving Technique
Xiuwen MA Qiaoyan WEN Jie ZHANG Xuan ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/12/01
Vol. E94-A  No. 12 ; pp. 2874-2878
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
binary sequencegood autocorrelationinterleaved sequencesCDMAstream cipher
 Summary | Full Text:PDF(345KB)

New Constructions of Binary Sequences with Optimal Autocorrelation Magnitude Based on Interleaving Technique
Xiuwen MA Qiaoyan WEN Jie ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/08/01
Vol. E94-A  No. 8 ; pp. 1760-1763
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
binary sequenceoptimal autocorrelationinterleaved sequencesCDMAstream cipher
 Summary | Full Text:PDF(91.7KB)

Construction of d-Form Sequences with Ideal Autocorrelation
Tongjiang YAN Xiaoni DU Yuhua SUN Guozhen XIAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/08/01
Vol. E94-A  No. 8 ; pp. 1696-1700
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
stream ciphersequencesd-form functionsdifference-balanced
 Summary | Full Text:PDF(327.2KB)

Constructing Correlation Immune Symmetric Boolean Functions
Jie PENG Haibin KAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/07/01
Vol. E94-A  No. 7 ; pp. 1591-1596
Type of Manuscript:  LETTER
Category: Coding Theory
Keyword: 
stream ciphercorrelation attackcorrelation immunitysymmetric Boolean function
 Summary | Full Text:PDF(100.1KB)

Annihilators and Algebraic Immunity of Symmetric Boolean Functions
Jie PENG Haibin KAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1434-1440
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
stream cipheralgebraic attackalgebraic immunitycorrelation immuneweight supportsymmetric Boolean functionpalindromic Boolean function
 Summary | Full Text:PDF(283.7KB)

Linear Complexity of Quaternary Sequences Generated Using Generalized Cyclotomic Classes Modulo 2p
Xiaoni DU Zhixiong CHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/05/01
Vol. E94-A  No. 5 ; pp. 1214-1217
Type of Manuscript:  LETTER
Category: Information Theory
Keyword: 
stream cipherpseudorandom sequencesgeneralized cyclotomic sequencesquaternary sequenceslinear complexity
 Summary | Full Text:PDF(78KB)

Generalized Classes of Weak Keys on RC4 Using Predictive State
Ryoichi TERAMURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 10-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4weak keypredictive state
 Summary | Full Text:PDF(630.7KB)

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree
Shaojing FU Chao LI Kanta MATSUURA Longjiang QU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 265-267
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherboolean functionresiliencynonlinearity
 Summary | Full Text:PDF(93.1KB)

Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
Yukiyasu TSUNOO Takeshi KAWABATA Tomoyasu SUZAKI Hiroyasu KUBO Teruo SAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A  No. 4 ; pp. 799-807
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
eSTREAMstream cipherDICINGcache attacks
 Summary | Full Text:PDF(338.6KB)

Trace Representation of a New Class of Sextic Residue Sequences of Period p≡3 ( mod 8)
Xiaoni DU Zhixiong CHEN Ailing SHI Rong SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/02/01
Vol. E92-A  No. 2 ; pp. 668-670
Type of Manuscript:  LETTER
Category: Information Theory
Keyword: 
stream ciphersextic residue sequencestrace functionlinear complexity
 Summary | Full Text:PDF(73.5KB)

A Chosen-IV Key Recovery Attack on Py and Pypy
Takanori ISOBE Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1 ; pp. 32-40
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
cryptanalysisstream cipherPyPypyeSTREAMkey recovery attack
 Summary | Full Text:PDF(374.5KB)

Security Analysis of a Variant of Self-Shrinking Generator
Dong Hoon LEE Je Hong PARK Jae Woo HAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7 ; pp. 1824-1827
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipherLFSRself-shrinking generatorguess-and-determine attack
 Summary | Full Text:PDF(81.7KB)

New Weakness in the Key-Scheduling Algorithm of RC4
Toshihiro OHIGASHI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 3-11
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4key scheduling algorithm
 Summary | Full Text:PDF(308.7KB)

Linearization Method and Linear Complexity
Hidema TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 22-29
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
pseudo-random number generatorlinear complexityalgebraic cryptanalysislinearization methodstream cipher
 Summary | Full Text:PDF(167KB)

On Effectiveness of Clock Control in Stream Ciphers
Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9 ; pp. 1780-1787
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
stream cipherclock controlirregular clocking
 Summary | Full Text:PDF(262.7KB)

Linear Complexity of Sequences under Different Interpretations
Andrew KLAPPER 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/09/01
Vol. E89-A  No. 9 ; pp. 2254-2257
Type of Manuscript:  INVITED PAPER (Special Section on Sequence Design and its Application in Communications)
Category: 
Keyword: 
linear complexitystream cipherfinite fieldpseudorandom sequence
 Summary | Full Text:PDF(117.9KB)

Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator
Pino CABALLERO-GIL Amparo FUSTER-SABATER 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5 ; pp. 1166-1172
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cellular automatacryptanalysisstream ciphershrinking generatoralgorithmsdiscrete mathematics
 Summary | Full Text:PDF(156.9KB)

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers
Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10 ; pp. 2778-2791
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
stream cipherGuess-and-Determine attackAA5clock control
 Summary | Full Text:PDF(714.2KB)

A MAC Forgery Attack on SOBER-128
Dai WATANABE Soichi FURUYA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5 ; pp. 1166-1172
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
stream ciphermessage authentication codeauthenticated encryptiondifferential cryptanalysisSOBER
 Summary | Full Text:PDF(210.8KB)

A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis
Hiroki SEKINE Tetsuro NOSAKA Yasuo HATANO Masaki TAKEDA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 16-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
truncated linear cryptanalysisstream cipherpseudorandom number generatorMUGI
 Summary | Full Text:PDF(727.6KB)

A New Keystream Generator MUGI
Dai WATANABE Soichi FURUYA Hirotaka YOSHIDA Kazuo TAKARAGI Bart PRENEEL 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 37-45
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
keystream generatorstream cipherPANAMAre-synchronization attackrelated-key attack
 Summary | Full Text:PDF(335.3KB)

Internal-State Reconstruction of a Stream Cipher RC4
Yoshiaki SHIRAISHI Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10 ; pp. 2636-2638
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
stream cipherRC4internal-state reconstruction
 Summary | Full Text:PDF(146.9KB)

A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications
Youji FUKUTA Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8 ; pp. 2155-2158
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
stream ciphernonlinear combiner generatorfast correlation attackparity check equations
 Summary | Full Text:PDF(187.5KB)

Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher
Miodrag J. MIHALJEVIC Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 66-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherkeystream generatorslinear feedback shift registersnonlinear filtercryptanalysis
 Summary | Full Text:PDF(280.4KB)

Integrity-Aware Mode of Stream Cipher
Soichi FURUYA Dai WATANABE Yoichi SETO Kazuo TAKARAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 58-65
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream ciphermodes of operationperfect secrecymessage authenticity
 Summary | Full Text:PDF(356.9KB)

An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations
Miodrag J. MIHALJEVIC Marc P. C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 311-318
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherkeystream generatorslinear feedback shift registersfast correlation attackdecoding
 Summary | Full Text:PDF(245.7KB)

On the Randomness of Chambers and Gollmann Keystream Generator
Fumio SATO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 303-310
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographystream cipherself-decimation system
 Summary | Full Text:PDF(231.6KB)

Comparison of Performance between AND and Majority Logic Type Nonlinear Feedforward Logic Pseudonoise Sequence Generators
Kari H. A. KARKKAINEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/08/25
Vol. E82-A  No. 8 ; pp. 1641-1647
Type of Manuscript:  PAPER
Category: Spread Spectrum Technologies and Applications
Keyword: 
information securityspreading codestream cipherlinear complexitycorrelation attackspread-spectrum systemcode division multiple access
 Summary | Full Text:PDF(982.8KB)

A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF (q) and Time-Variant Table
Miodrag MIHALJEVIC Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 32-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
data encryptionstream cipherkeystream generatorscellular automata
 Summary | Full Text:PDF(155.7KB)