Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,209 papers from all fields of science
Search
Sign In
Create Free Account
Stream cipher
Known as:
Self-synchronizing stream cipher
, Self-synchronizing cipher
, Additive cipher
Expand
A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
32-bit
ABC (stream cipher)
Application-specific integrated circuit
BEAR and LION ciphers
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication
Yiyuan Luo
,
Qi Chai
,
G. Gong
,
Xuejia Lai
IEEE Global Telecommunications Conference…
2010
Corpus ID: 17689343
The family of WG stream ciphers has good randomness properties. In this paper, we parameterize WG-7 stream cipher for RFID tags…
Expand
2010
2010
Update on Enocoro stream cipher
Dai Watanabe
,
Toru Owada
,
Kazuto Okamoto
,
Y. Igarashi
,
T. Kaneko
International Symposium on Information Theory and…
2010
Corpus ID: 850995
Enocoro is a family of stream ciphers proposed by Watanabe et al. in 2007. It consists of two algorithms called Enocoro-80 and…
Expand
2008
2008
CryptMT3 Stream Cipher
M. Matsumoto
,
Mutsuo Saito
,
T. Nishimura
,
Mariko Hagita
The eSTREAM Finalists
2008
Corpus ID: 28553989
CryptMT version 3 (CryptMT3) is a stream cipher obtained by combining a large LFSR and a nonlinear filter with memory using…
Expand
Highly Cited
2007
Highly Cited
2007
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Håkan Englund
,
T. Johansson
,
Meltem Sönmez Turan
International Conference on Cryptology in India
2007
Corpus ID: 18097959
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several…
Expand
Highly Cited
2005
Highly Cited
2005
The WG Stream Cipher
Yassir Nawaz
,
G. Gong
2005
Corpus ID: 57537736
In this paper we propose a new synchronous stream cipher, called WG cipher. The cipher is based on WG (Welch-Gong…
Expand
Highly Cited
2005
Highly Cited
2005
Towards a General RC4-Like Keystream Generator
G. Gong
,
K. Gupta
,
Martin Hell
,
Yassir Nawaz
CISC
2005
Corpus ID: 9184065
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64…
Expand
Highly Cited
2003
Highly Cited
2003
Signature of palaeo‐ice‐stream stagnation: till consolidation induced by basal freeze‐on
P. Christoffersen
,
S. Tulaczyk
2003
Corpus ID: 59416011
A combination of glaciological theory and geological observations was used to investigate the possibility of till consolidation…
Expand
Highly Cited
2002
Highly Cited
2002
Scream: A Software-Efficient Stream Cipher
S. Halevi
,
D. Coppersmith
,
C. Jutla
Fast Software Encryption Workshop
2002
Corpus ID: 1499691
We report on the design of Scream, a new software-efficient stream cipher, which was designed to be a "more secure SEAL…
Expand
2001
2001
Chaos for Stream Cipher
Ninan Sajeeth
,
Philip K Babu
arXiv.org
2001
Corpus ID: 13337696
This paper discusses mixing of chaotic systems as a dependable method for secure communication. Distribution of the entropy…
Expand
Highly Cited
1998
Highly Cited
1998
The Reference Reach - a Blueprint for Natural Channel Design
D. Rosgen
1998
Corpus ID: 131024964
The reference reach is a river segment that represents a stable channel within a particular valley morphology. The reference…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE