Design and Cryptanalysis of ZUC Design and Cryptanalysis of ZUC
SpringerBriefs on Cyber Security Systems and Networks

Design and Cryptanalysis of ZUC

A Stream Cipher in Mobile Telephony

    • €42.99
    • €42.99

Publisher Description

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.

GENRE
Computing & Internet
RELEASED
2021
27 January
LANGUAGE
EN
English
LENGTH
116
Pages
PUBLISHER
Springer Nature Singapore
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
7.5
MB
Information Security and Cryptology – ICISC 2021 Information Security and Cryptology – ICISC 2021
2022
Information Security and Cryptology – ICISC 2019 Information Security and Cryptology – ICISC 2019
2020
Progress in Cryptology - INDOCRYPT 2008 Progress in Cryptology - INDOCRYPT 2008
2008
Advances in Cryptology – EUROCRYPT 2023 Advances in Cryptology – EUROCRYPT 2023
2023
Information Security and Cryptology Information Security and Cryptology
2021
Advances in Cryptology – ASIACRYPT 2022 Advances in Cryptology – ASIACRYPT 2022
2023
Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
2022
Privacy-Preserving Deep Learning Privacy-Preserving Deep Learning
2021
Cybersecurity in Digital Transformation Cybersecurity in Digital Transformation
2020
Location Privacy in Mobile Applications Location Privacy in Mobile Applications
2018
Big Digital Forensic Data Big Digital Forensic Data
2018
Advanced Monitoring in P2P Botnets Advanced Monitoring in P2P Botnets
2018