# The Stability Theory of Stream Ciphers

Format
Post in Mathematics
BY **Cunsheng Ding, Guozhen Xiao, Weijuan Shan**

3540549730 Shared By Guest

**The Stability Theory of Stream Ciphers** Cunsheng Ding, Guozhen Xiao, Weijuan Shan is available to download <table><tr><td colspan="2"><strong style="font-size:1.This material is available do download at niSearch.com on **Cunsheng Ding, Guozhen Xiao, Weijuan Shan**'s eBooks, 2em;">The Stability Theory of Stream Ciphers</strong><br/>Cunsheng Ding, Guozhen Xiao, Weijuan Shan</td></tr> <tr> <td><b>Type:</b></td> <td>eBook</td> </tr> <tr> <td><b>Released:</b></td> <td>1991</td> </tr> <tr> <td><b>Publisher:</b></td> <td>Springer</td> </tr> <tr> <td><b>Page Count:</b></td> <td>197</td> </tr> <tr> <td><b>Format:</b></td> <td>djvu</td> </tr> <tr> <td><b>Language:</b></td> <td>English</td> </tr> <tr> <td><b>ISBN-10:</b></td> <td>3540549730</td> </tr> <tr> <td><b>ISBN-13:</b></td> <td>9783540549734</td> </tr> </table>
Secure message transmission is of extreme importance in today's information-based society.*The Stability Theory of ...* Textbook Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.

## Comments (0)