This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Encryption Schemes for Computer Confidentiality
November 1977 (vol. 26 no. 11)
pp. 1133-1136
V.S. Pless, Department of Mathematics, College of Liberal Arts and Sciences, University of Illinois
This is a first attempt to develop shift-register-based encryption methods with nonlinear characteristics. We propose some new stream enciphering schemes composed of standard components which are easy to implement and appear to be difficult to break by either a linear attack or statistical analysis.
Index Terms:
Computer confidentiality, cryptography, J-K flip-flops, maximum-length shift-register sequences, stream enciphering schemes.
Citation:
V.S. Pless, "Encryption Schemes for Computer Confidentiality," IEEE Transactions on Computers, vol. 26, no. 11, pp. 1133-1136, Nov. 1977, doi:10.1109/TC.1977.1674759
Usage of this product signifies your acceptance of the Terms of Use.