LEADER 03955nam 22006615 450 001 996465327503316 005 20200704013645.0 010 $a3-540-46626-6 024 7 $a10.1007/3-540-54973-0 035 $a(CKB)1000000000233754 035 $a(SSID)ssj0000326849 035 $a(PQKBManifestationID)11225668 035 $a(PQKBTitleCode)TC0000326849 035 $a(PQKBWorkID)10297415 035 $a(PQKB)11589359 035 $a(DE-He213)978-3-540-46626-0 035 $a(PPN)15518315X 035 $a(EXLCZ)991000000000233754 100 $a20121227d1991 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 14$aThe Stability Theory of Stream Ciphers$b[electronic resource] /$fby Cunsheng Ding, Guozhen Xiao, Weijuan Shan 205 $a1st ed. 1991. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1991. 215 $a1 online resource (X, 194 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v561 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-54973-0 327 $aStream ciphers -- The BAA attacks on several classes of stream ciphers -- Measure indexes on the security of stream ciphers -- The stability of linear complexity of sequences -- The period stability of sequences -- Summary and open problems. 330 $aSecure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v561 606 $aData encryption (Computer science) 606 $aComputer security 606 $aOperating systems (Computers) 606 $aNumerical analysis 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aNumerical Analysis$3https://scigraph.springernature.com/ontologies/product-market-codes/M14050 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aOperating systems (Computers). 615 0$aNumerical analysis. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aOperating Systems. 615 24$aNumerical Analysis. 676 $a652/.8 700 $aDing$b Cunsheng$4aut$4http://id.loc.gov/vocabulary/relators/aut$061838 702 $aXiao$b Guozhen$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aShan$b Weijuan$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a996465327503316 996 $aThe Stability Theory of Stream Ciphers$92831519 997 $aUNISA