Publication Cover
Cybernetics and Systems
An International Journal
Volume 39, 2008 - Issue 7
55
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG

&
Pages 705-718 | Published online: 26 Aug 2008

REFERENCES

  • Aoki , K. , Ichikawa , T. , Kanda , M. , Matsui , M. , Moriai , S. , Nakajima , J. , and Tokita , T. 2000 . Camellia: A 128-bit block cipher suitable for multiple platforms—design and analysis . Selected Areas in Cryptography 39 – 56 .
  • ARIA. http://www.nsri.re.kr.
  • Beker , H. J. and Piper , F. C. 1985 . Secure speech communications . London : Academic Press .
  • Chen , K. , Henrickson , M. , Millan , W. , Fuller , J. , Simpson , A. , Dawson , E. , Lee , H. , and Moon , S. 2004 . Dragon: A fast word based stream cipher . LNCS 3506 (ICISC'2004) : 414 – 431 .
  • Clark , A. , Dawson , E. , Fuller , J. , Golic , J. , Lee , H. , Millan , W. , Moon , S. , and Simpson , L. 2002 . The LILI-II keystream generator . LNCS 2384 (ACISP'2002) : 25 – 39 .
  • Diffie , W. and Hellman , M. E. 1976 . New directions in cryptography . IEEE Trans. On Infor. Theory IT-22(6) : 644 – 654 .
  • KISA . 1998 . Development of SEED, the 128-bit block cipher standard, http://www.kisa.or.kr .
  • Lee , H. 1997 . An improved synchronous stream cipher system for a link encryption. PhD diss., KyungPook National University, Daegu, Korea .
  • Lee , H. and Chen , K. 2007 . PingPong-128, A new stream cipher for ubiquitous application . IEEE CS (ICCIT 2007) 1893 – 1899 .
  • Lee , H. and Moon , S. 2002 . Parallel stream cipher for secure high-speed communications . Signal Processing , 82 ( 2 ): 259 – 265 .
  • Lee , H. and Moon , S. 1998 . A Zero-suppression algorithm for the synchronous stream cipher . Applied Signal Processing , 5 ( 4 ): 240 – 243 .
  • Menezes , A. , Oorschot , P. , and Van Vanstone , S. 1997 . Handbook of applied cryptography . New York: CRC Press .
  • Moon , S. and Lee , P. 1990 . A proposal of a key distribution protocol . Paper presented at the Proceedings of the Korean Workshop on Information Security and Cryptography-WISC'90 , 117 – 124 .
  • NIST . 2001 . Announcing the advanced encryption standard (AES). FIPS-197 .
  • Park , B. , Choi , H. , Chang , T. , and Kang , K. 1993 . Period of sequences of primitive polynomials . Electronics Letters , 29 ( 4 ): 390 – 391 .
  • Proakis , J. 1995 . Digital Communications () , 3rd Ed. . New York: McGraw-Hill, Inc .
  • Rueppel , R. A. 1986 . Analysis and design of stream ciphers . Springer-Verlag : Berlin.
  • Schneier , S. 1996 . Applied cryptography: protocols, algorithms, and source code in C () , 2nd Ed. . New York : John Wiley and Sons, Inc .
  • Tatebayashi , M. , Matsuzaki , N. , and Newman , D. B. 1990 . A cryptosystem using digital signal processors for mobile communication . ICASSP'90 37.1.1 – 37.1.4 .
  • Tilborg , H. C. A. 2000 . Fundamentals of cryptology . Kluwer Academic Publishers . Boston .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.