Design and Cryptanalysis of ZUC Design and Cryptanalysis of ZUC
SpringerBriefs on Cyber Security Systems and Networks

Design and Cryptanalysis of ZUC

A Stream Cipher in Mobile Telephony

    • $44.99
    • $44.99

Publisher Description

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.

GENRE
Computers & Internet
RELEASED
2021
January 27
LANGUAGE
EN
English
LENGTH
116
Pages
PUBLISHER
Springer Nature Singapore
SELLER
Springer Nature B.V.
SIZE
7.5
MB
Information Security and Cryptology – ICISC 2021 Information Security and Cryptology – ICISC 2021
2022
Information Security and Cryptology – ICISC 2019 Information Security and Cryptology – ICISC 2019
2020
Progress in Cryptology - INDOCRYPT 2008 Progress in Cryptology - INDOCRYPT 2008
2008
Advances in Cryptology – EUROCRYPT 2023 Advances in Cryptology – EUROCRYPT 2023
2023
Information Security and Cryptology Information Security and Cryptology
2021
Advances in Cryptology – ASIACRYPT 2022 Advances in Cryptology – ASIACRYPT 2022
2023
Big Digital Forensic Data Big Digital Forensic Data
2018
Honeypot Frameworks and Their Applications: A New Framework Honeypot Frameworks and Their Applications: A New Framework
2018
Big Digital Forensic Data Big Digital Forensic Data
2018
Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
2022
Privacy-Preserving Deep Learning Privacy-Preserving Deep Learning
2021
Cybersecurity in Digital Transformation Cybersecurity in Digital Transformation
2020