×







We sell 100% Genuine & New Books only!

Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation 2019 Edition at Meripustak

Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation 2019 Edition by Sara Díaz Cardell, Amparo Fúster-Sabater , Springer

Books from same Author: Sara Díaz Cardell, Amparo Fúster-Sabater

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 4714.00/- [ 17.00% off ]

    Seller Price: ₹ 3913.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Sara Díaz Cardell, Amparo Fúster-Sabater
    PublisherSpringer
    ISBN9783030128494
    Pages101
    BindingPaperback
    LanguageEnglish
    Publish YearMay 2019

    Description

    Springer Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation 2019 Edition by Sara Díaz Cardell, Amparo Fúster-Sabater

    This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field. Table of contents : - Chapter 1- Introduction to stream ciphers.- Chapter 2- Keystream generators based on irregular decimation.- Chapter 3- Modelling through linear cellular automata.- Chapter 4- Cryptanalysis.- References.



    Book Successfully Added To Your Cart