Author:
Ming Hao,Hu Hanping,Xie Xuhui,Yang Jiechao
Funder
National Key R &D Program of China
Cryptography Theoretical Research of National Cryptography Development Fund
Key R &D Program of Hubei Province
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Mechanical Engineering,Ocean Engineering,Aerospace Engineering,Control and Systems Engineering
Reference36 articles.
1. ISO/IEC 29192-3:2012-information technology-security techniques-lightweight cryptography-part 3: stream ciphers. Technical report, International Organization for Standardization (2012). https://www.iso.ort/tandard/56426.html
2. Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for embedded systems—a comparative analysis. In: data privacy management and autonomous spontaneous security-8th international workshop, DPM 2013, Egham, UK, Sept 12–13, 2013, vol. 8247, pp. 333–349. Springer (2013)
3. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)
4. Jindal, P., Singh, B.: RC4 encryption-a literature survey. Proc. Comput. Sci. 46, 697–705 (2015)
5. ETSI/SAGE: Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. document 2: ZUC specification. Technical report in The 3rd Generation Artnership Project (2011). https://www.gsma.com/aboutus/wp-content/uploads/2014/12/eea3eia3zucv16.pdf