2022
DOI: 10.1007/978-3-030-79770-6
|View full text |Cite
|
Sign up to set email alerts
|

Stream Ciphers in Modern Real-time IT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 0 publications
0
5
0
1
Order By: Relevance
“…The algorithm HC (Fig. 3) and the heuristic function WHS successfully coped with the task of generating such nonlinear substitutions [32,33]. These results are relevant, because most modern symmetric cryptographic algorithms use such substitutions.…”
Section: Discussionmentioning
confidence: 97%
See 1 more Smart Citation
“…The algorithm HC (Fig. 3) and the heuristic function WHS successfully coped with the task of generating such nonlinear substitutions [32,33]. These results are relevant, because most modern symmetric cryptographic algorithms use such substitutions.…”
Section: Discussionmentioning
confidence: 97%
“…We need to perform on ). Such cryptographically strong S-boxes are currently integrated and used in modern symmetric ciphers [30][31][32][33].…”
Section: Related Workmentioning
confidence: 99%
“…По друге, S-блоки повинні забезпечувати необхідні криптографічні властивості, які значно ускладнюють реалізацію різних криптоаналітичних атак (диференційного, лінійного, статистичного та інш.) [3,6,7]. Отже задача генерації нелінійних підстановок є складною та надзвичайно важливою з точки зору подальшого удосконалення криптографічних алгоритмів із симетричним ключем.…”
Section: вступunclassified
“…Data encryption algorithms with symmetric keys are used in modern computer systems to ensure confidentiality, integrity, authenticity and other information security services [1][2][3]. The main condition for using such encryption algorithms is the availability of a secret key, which is identical for the sender and receiver of data.…”
Section: Introductionmentioning
confidence: 99%
“…According to modern concepts, nonlinear substitutions in cryptography should be random [2]. Nonrandom methods of substitution generation can cause vulnerabilities in cryptoalgorithms [6,7].…”
Section: Introductionmentioning
confidence: 99%