19
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

An error‐correcting stream cipher design with state‐hopping architecture

&
Pages 9-16 | Received 14 Mar 2003, Accepted 09 Jun 2004, Published online: 04 Mar 2011

References

  • Bystrom , M. and Modestino , J. W. 2000 . “Combined Sourcechannel Coding Schemes for Video Transmission over an Additive White Gaussian Noise Channel” . IEEE Journal on Selected Areas in Communcations , 18 ( 6 ) : 880 – 890 .
  • Cheng , H. and Li , X. 2000 . “Partial Encryption of Compressed Images and Videos” . IEEE Transactions on Signal Processing , 48 ( 8 ) : 2439 – 2451 .
  • Denis , A. and Kinsner , W. “Secure and Resilient Data Printed on Paper” . Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering . Edmonton, Alberta, Canada. Vol. 1 , pp. 245 – 248 . Shaw Conference Center .
  • Ho , K. P. and Kahn , J. M. 1996 . “Transmission of Analog Signals Using Multicarrier Modulation: a Combined Source‐Channel Coding Approach” . IEEE Transactions on Communications , 44 ( 11 ) : 1432 – 1443 .
  • Hwang , T. and Rao , T. R. N. 1990 . “Secret Error‐Correcting Codes (SECC)” . In Advances in Cryptology‐Crypto ’88 , 540 – 563 . New York, , USA : Springer‐Verlag .
  • Lin , S. 1983 . Error Control Coding: Fundamentals and Applications , NJ, , USA : Prentice‐Hall .
  • McEliece , R. J. 1978 . “A Public Key Cryptosystem Based on Algebraic Coding Theory” . DSN Progress Report 42–44 114 – 116 . CA, , USA : Jet Propulsion Laboratory .
  • Meier , W. and Staffebach , O. 1989 . “Fast Correlation Attacks on Certain Stream Ciphers” . Journal of Cryptology , 1 ( 3 ) : 159 – 167 .
  • Modestino , J. W. , Daut , D. G. and Vickers , A. L. 1981 . “Combined Source‐channel Coding of Images Using the Block Cosine Transform” . IEEE Transactions on Communications , IT‐33 ( 9 ) : 827 – 837 .
  • Niederreiter , H. 1992 . Random Number Generation and Quasi‐Monte Carlo Methods , PA, , USA : Society of Industrial and Applied Mathematics .
  • Rao , T. R. N. and Nam , K. 1987 . “Private‐Key Algebraic Cryptosystems” . In Advances in Cryptology‐Crypto ’86 , 35 – 48 . London, , UK : Springer‐Verlag .
  • Rao , T. R. N. and Nam , K. 1989 . “Private‐Key Algebraic‐code Encryptions” . IEEE Transactions on Information Theory , IT‐35 ( 4 ) : 829 – 833 .
  • Rukhin , A. , Soto , J. , Nechvatal , J. , Smid , M. , Barker , E. , Leigh , S. , Levenson , M. , Vangel , M. , Banks , D. , Heckert , A. , Dray , J. and Vo , S. 2001 . “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications” . National Institute of Standards and Technology publication 800–22
  • Siegenthaler , T. 1985 . “Decrypting a Class of Stream Ciphers Using Ciphertext Only” . IEEE Transactions on Computing , C‐34 ( 1 ) : 81 – 85 .
  • Stinson , D. R. 1995 . Cryptography: Theory and Practice , New York, , USA : CRC press .
  • Zeng , K. , Yang , C. H. and Rao , T.R.N. 2001 . “Cryptanalysis of the Hwang‐Rao Secret Error‐Correcting Code Schemes” . Lecture Notes in Computer Science , 2229 : 419 – 428 .
  • Zhang , M. 2000 . “Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers” . Journal of Cryptology , 13 ( 3 ) : 301 – 314 .
  • Corresponding author. (Tel: 886–3–5131538; Fax: 886–3–5712385; Email: [email protected])

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.