Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,263,646 papers from all fields of science
Search
Sign In
Create Free Account
Stream cipher
Known as:
Self-synchronizing stream cipher
, Self-synchronizing cipher
, Additive cipher
Expand
A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
32-bit
ABC (stream cipher)
Application-specific integrated circuit
BEAR and LION ciphers
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Crossing Media Streams with Sentiment: Domain Adaptation in Blogs, Reviews and Twitter
Yelena Mejova
,
P. Srinivasan
International Conference on Web and Social Media
2012
Corpus ID: 9216614
Most sentiment analysis studies address classification of a single source of data such as reviews or blog posts. However, the…
Expand
Highly Cited
2010
Highly Cited
2010
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication
Yiyuan Luo
,
Qi Chai
,
G. Gong
,
Xuejia Lai
IEEE Global Telecommunications Conference…
2010
Corpus ID: 17689343
The family of WG stream ciphers has good randomness properties. In this paper, we parameterize WG-7 stream cipher for RFID tags…
Expand
2010
2010
Update on Enocoro stream cipher
Dai Watanabe
,
Toru Owada
,
Kazuto Okamoto
,
Y. Igarashi
,
T. Kaneko
International Symposium on Information Theory and…
2010
Corpus ID: 850995
Enocoro is a family of stream ciphers proposed by Watanabe et al. in 2007. It consists of two algorithms called Enocoro-80 and…
Expand
2008
2008
CryptMT3 Stream Cipher
M. Matsumoto
,
Mutsuo Saito
,
T. Nishimura
,
Mariko Hagita
The eSTREAM Finalists
2008
Corpus ID: 28553989
CryptMT version 3 (CryptMT3) is a stream cipher obtained by combining a large LFSR and a nonlinear filter with memory using…
Expand
2007
2007
Incorporating the Higher Harmonics in VIV Fatigue Predictions
V. Jhingran
,
J. Vandiver
2007
Corpus ID: 47143
Vortex-Induced Vibrations (VIV) are an important source of fatigue damage for risers in the Oil and Gas industry. Results from…
Expand
2006
2006
Update on F-FCSR Stream Cipher
F. Arnault
,
T. Berger
,
C. Lauradoux
2006
Corpus ID: 1227155
The F-FCSR family of algorithms have been presented about one year ago with [2] and [1]. While some flaws where found in the…
Expand
Highly Cited
2005
Highly Cited
2005
The WG Stream Cipher
Yassir Nawaz
,
G. Gong
2005
Corpus ID: 57537736
In this paper we propose a new synchronous stream cipher, called WG cipher. The cipher is based on WG (Welch-Gong…
Expand
2005
2005
Online Implementation of Servo Controllers Using Bit-Streams
N. Patel
,
S. Nguang
,
G. Coghill
,
A. Swain
IEEE Region 10 Conference
2005
Corpus ID: 40068647
The present study proposes an alternate strategy for implementing controllers based on bit-streams. The key to the success of bit…
Expand
Highly Cited
2002
Highly Cited
2002
Scream: A Software-Efficient Stream Cipher
S. Halevi
,
D. Coppersmith
,
C. Jutla
Fast Software Encryption Workshop
2002
Corpus ID: 1499691
We report on the design of Scream, a new software-efficient stream cipher, which was designed to be a "more secure SEAL…
Expand
2001
2001
Chaos for Stream Cipher
Ninan Sajeeth
,
Philip K Babu
arXiv.org
2001
Corpus ID: 13337696
This paper discusses mixing of chaotic systems as a dependable method for secure communication. Distribution of the entropy…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE