DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mihaljević, Miodrag J. | en_US |
dc.contributor.author | Imai, Hideki | en_US |
dc.date.accessioned | 2020-03-05T20:28:20Z | - |
dc.date.available | 2020-03-05T20:28:20Z | - |
dc.date.issued | 2010-12-01 | - |
dc.identifier.isbn | 978-142446017-5 | - |
dc.identifier.uri | http://researchrepository.mi.sanu.ac.rs/handle/123456789/100 | - |
dc.description.abstract | Following some of the recently reported results, an approach for design of stream ciphers has been considered which is based on joint employment of pseudorandomness, randomness and dedicated wire-tap channel and error correction coding. The wire-tap channel coding controlled by the randomness, provides that an attacker faces not only the traditional problems of cryptanalysis but also the problem of decoding without the secret key which appears as complex as the exhaustive search over the possible secret keys. Security evaluation has been performed based on the algebraic representation of the proposed stream cipher. The given security evaluation has addressed hardness of the algebraic recovering of the secret key in the CPA scenario. It is shown that the secret key recovery is as hard as the LPNε problem where ε = 1-(1-2p) (m-ℓ)/2/2 and m, ℓ and p are the stream cipher parameters. | en_US |
dc.publisher | IEEE | en_US |
dc.relation | Advanced methods for cryptology and information processing | en_US |
dc.relation.ispartof | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications | en_US |
dc.subject | Algebraic representations | Error correction coding | Exhaustive search | Pseudorandomness | Secret key | Security evaluation | Stream Ciphers | en_US |
dc.title | A security evaluation of certain stream ciphers which involve randomness and coding | en_US |
dc.type | Conference Paper | en_US |
dc.relation.conference | 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010 | en_US |
dc.identifier.doi | 10.1109/ISITA.2010.5649616 | - |
dc.identifier.scopus | 2-s2.0-78651336880 | - |
dc.contributor.affiliation | Mathematical Institute of the Serbian Academy of Sciences and Arts | en_US |
dc.relation.firstpage | 789 | en |
dc.relation.lastpage | 794 | en |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Paper | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
crisitem.project.projectURL | http://www.mi.sanu.ac.rs/projects/144018e.htm | - |
crisitem.author.orcid | 0000-0003-3047-3020 | - |
SCOPUSTM
Citations
4
checked on Dec 20, 2024
Page view(s)
22
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.