2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2018
DOI: 10.1109/iccic.2018.8782345
|View full text |Cite
|
Sign up to set email alerts
|

LFL-A New Stream Cipher for Secure Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In our study, we compared the secure MICKEY 2.0 cipher with the proposed MICKEY 2.0.85 cipher to ensure security. Another new design consisting of two nonlinear feedback shift registers with target implementation on small devices was found to have a good pseudo-randomness appearance based on the implementation of NIST statistical tests in cryptographic applications [25].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In our study, we compared the secure MICKEY 2.0 cipher with the proposed MICKEY 2.0.85 cipher to ensure security. Another new design consisting of two nonlinear feedback shift registers with target implementation on small devices was found to have a good pseudo-randomness appearance based on the implementation of NIST statistical tests in cryptographic applications [25].…”
Section: Related Workmentioning
confidence: 99%
“…(The operations described above and depicted in Figures 2-4 make use of these data structures.) 1,3,4,5,6,9,12,13,16,19,20,21,22,25,28,37,38,41,42,45,46…”
Section: Internal State Driversmentioning
confidence: 99%
“…Survey related to stream ciphers used in wireless communications can be found in [28]. A new stream cipher design proposed in [29] which is based on combiner generator. A chaotic based stream cipher was presented in [30], in which session key changes dynamically.…”
Section: Two Basic Types Of Fcsrs Are Fibonacci and Galois Representamentioning
confidence: 99%
“…To resist this attack and spoil the linearity properties of LFSRs, there are three basic schemes that can be achieved, which include: a nonlinear combining function on the outputs of several LFSRs, a nonlinear filtering function on the contents of a single LFSR, and using the output of one (or more) LFSRs to control the clock of one or more other LFSRs, which are the clock-controlled LFSRs. All of these schemes require a nonlinear function to combine the outputs of LFSRs or control the input clock for clock-controlled LFSRs [10][11][12][13][14]. The clock-controlled based stream cipher A5/1 uses the nonlinear majority function as the nonlinear function to promote its security.…”
Section: Introductionmentioning
confidence: 99%