001434438 000__ 03203cam\a2200613\i\4500 001434438 001__ 1434438 001434438 003__ OCoLC 001434438 005__ 20230309003729.0 001434438 006__ m\\\\\o\\d\\\\\\\\ 001434438 007__ cr\nn\nnnunnun 001434438 008__ 210127s2021\\\\si\a\\\\ob\\\\001\0\eng\d 001434438 019__ $$a1235762779$$a1236262802 001434438 020__ $$a9813348828$$q(electronic book) 001434438 020__ $$a9789813348820$$q(electronic bk.) 001434438 020__ $$z981334881X 001434438 020__ $$z9789813348813 001434438 0247_ $$a10.1007/978-981-33-4882-0$$2doi 001434438 035__ $$aSP(OCoLC)1239997266 001434438 040__ $$aSFB$$beng$$erda$$epn$$cSFB$$dGW5XE$$dYDX$$dEBLCP$$dOCLCO$$dOCLCF$$dUKAHL$$dOCLCO$$dOCLCQ$$dOCLCO$$dCOM$$dOCLCO$$dN$T$$dOCLCQ 001434438 049__ $$aISEA 001434438 050_4 $$aQA76.9.A25 001434438 08204 $$a005.8/2$$223 001434438 1001_ $$aMukherjee, Chandra Sekhar,$$eauthor. 001434438 24510 $$aDesign and cryptanalysis of ZUC :$$ba stream cipher in mobile telephony /$$cChandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra. 001434438 24630 $$aStream cipher in mobile telephony 001434438 2463_ $$aZUC stream cipher 001434438 264_1 $$aSingapore :$$bSpringer,$$c[2021] 001434438 300__ $$a1 online resource (xviii, 98 pages) :$$billustrations (some color) 001434438 336__ $$atext$$btxt$$2rdacontent 001434438 337__ $$acomputer$$bc$$2rdamedia 001434438 338__ $$aonline resource$$bcr$$2rdacarrier 001434438 4901_ $$aSpringerbriefs on cyber security systems and networks,$$x2522-5561 001434438 504__ $$aIncludes bibliographical references and index. 001434438 5050_ $$aIntroduction and preliminaries -- Telephony architecture -- Design specification of ZUC stream cipher -- Cryptanalysis on ZUC 1.4 -- Concluding remarks -- Appendix: Test vectors for ZUC. 001434438 506__ $$aAccess limited to authorized users. 001434438 520__ $$aThis book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher. 001434438 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 9, 2021). 001434438 650_0 $$aStream ciphers. 001434438 650_0 $$aData encryption (Computer science) 001434438 650_0 $$aCell phone systems$$xSecurity measures. 001434438 650_6 $$aChiffrement à flot. 001434438 650_6 $$aChiffrement (Informatique) 001434438 650_6 $$aTéléphonie cellulaire$$xSécurité$$xMesures. 001434438 655_0 $$aElectronic books. 001434438 7001_ $$aRoy, Dibyendu,$$eauthor. 001434438 7001_ $$aMaitra, Subhamoy,$$d1970-$$eauthor. 001434438 77608 $$iPrint version:$$z9789813348813 001434438 830_0 $$aSpringerBriefs on cyber security systems and networks,$$x2522-5561 001434438 852__ $$bebk 001434438 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-33-4882-0$$zOnline Access$$91397441.1 001434438 909CO $$ooai:library.usi.edu:1434438$$pGLOBAL_SET 001434438 980__ $$aBIB 001434438 980__ $$aEBOOK 001434438 982__ $$aEbook 001434438 983__ $$aOnline 001434438 994__ $$a92$$bISE