2016
DOI: 10.17577/ijertv5is120073
|View full text |Cite
|
Sign up to set email alerts
|

Hypered Cryptographic Algorithm for LTE Data Confidentiality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Stream ciphers are widely used in practice as an essential solution for protecting the information transmitted in communications. Currently, there are proposals for secure and efficient stream ciphers in various communication protocols for encrypting and decrypting messages in networks [2][3][4][5]. One of the encryption schemes in symmetric cryptography is stream ciphers [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Stream ciphers are widely used in practice as an essential solution for protecting the information transmitted in communications. Currently, there are proposals for secure and efficient stream ciphers in various communication protocols for encrypting and decrypting messages in networks [2][3][4][5]. One of the encryption schemes in symmetric cryptography is stream ciphers [6,7].…”
Section: Introductionmentioning
confidence: 99%