LEADER 03723nam 22006855 450 001 9910338252303321 005 20250610110527.0 010 $a3-030-12850-4 024 7 $a10.1007/978-3-030-12850-0 035 $a(CKB)4100000008103768 035 $a(MiAaPQ)EBC5776232 035 $a(DE-He213)978-3-030-12850-0 035 $a(PPN)23652352X 035 $a(MiAaPQ)EBC29077926 035 $a(EXLCZ)994100000008103768 100 $a20190502d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography with Shrinking Generators $eFundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation /$fby Sara Díaz Cardell, Amparo Fúster-Sabater 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (xi, 101 pages) $cillustrations 225 1 $aSpringerBriefs in Mathematics,$x2191-8198 311 08$a3-030-12849-0 327 $aChapter 1- Introduction to stream ciphers -- Chapter 2- Keystream generators based on irregular decimation -- Chapter 3- Modelling through linear cellular automata -- Chapter 4- Cryptanalysis -- References. 330 $aThis book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field. . 410 0$aSpringerBriefs in Mathematics,$x2191-8198 606 $aDiscrete mathematics 606 $aCoding theory 606 $aInformation theory 606 $aAlgebra 606 $aData encryption (Computer science) 606 $aComputers 606 $aDiscrete Mathematics$3https://scigraph.springernature.com/ontologies/product-market-codes/M29000 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aAlgebra$3https://scigraph.springernature.com/ontologies/product-market-codes/M11000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aModels and Principles$3https://scigraph.springernature.com/ontologies/product-market-codes/I18016 615 0$aDiscrete mathematics. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgebra. 615 0$aData encryption (Computer science) 615 0$aComputers. 615 14$aDiscrete Mathematics. 615 24$aCoding and Information Theory. 615 24$aAlgebra. 615 24$aCryptology. 615 24$aModels and Principles. 676 $a652.8 676 $a005.824 700 $aDíaz Cardell$b Sara$4aut$4http://id.loc.gov/vocabulary/relators/aut$0781304 702 $aFúster-Sabater$b Amparo$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910338252303321 996 $aCryptography with Shrinking Generators$92529812 997 $aUNINA