2021
DOI: 10.1007/978-981-16-0666-3_13
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Sharing Based on Linear Congruetial Method in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Our proposed stream cipher plan is subjected to statistical analyses in order to demonstrate its robustness, such as randomness. NIST Test (National Institute of Standards and Technology) has a number of statistical trails that can be applied to assess the randomness of the series, including NIST [15][16][17], DIEH. [18] and NESS.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Our proposed stream cipher plan is subjected to statistical analyses in order to demonstrate its robustness, such as randomness. NIST Test (National Institute of Standards and Technology) has a number of statistical trails that can be applied to assess the randomness of the series, including NIST [15][16][17], DIEH. [18] and NESS.…”
Section: Methodsmentioning
confidence: 99%
“…In key initialization, the modified SNOW 3G stream cipher algorithm consists of 16 stages, each stage consisting of 32 bits and represented in F(2 16 ). LFSR (r0, r1, r2,..., r14, r15), the polynomial equation for LFSR is: R(x) = x 16 + x 12 + x 4 + x 3 + x 1 + 1 (1) 32-bit registers R1, R2, and R3, and two new S-Boxes SR1 and SR2 that are used to update registers R2 and R3.as shown Fig.…”
Section: Snow3g Modifymentioning
confidence: 99%
“…For the time being, the security of communications has become an additional and important element at present to ensure the transmission of data over networks is secure [1,2]. Sure, all of our daily transactions and communications in modern life are done through mobile networks [3,4].…”
Section: How To Work With This Templatementioning
confidence: 99%
“…The architecture of an agent is unrestricted; agents may be created to have traits such as reactivity, pro-activeness, cognitiveness, mobility, and others [22,23]. An agent should be able to deliver services to other system entities, and its services should be available via the agent's identifier [24][25][26]. As shown previously, there are two main problems resulted from securing the communications, time consuming and deadlock [27][28][29].…”
Section: Introductionmentioning
confidence: 99%