Abstract
In any communication system the users face the problem of protecting the transmitted data against a loss of their — objective or subjective — quality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kahn, The Codebreakes, McMillan, 1982
Beker/Piper, Ciphes-System — The Protection of Communications, Northwood, 1982
Konheim, Cryptography: A Primer, Wiley, 1981
Ryska/Herda, Kryptographische Verfahren in des Datenverarbeitung,Springer, 1980
Lüneburg, Galoisgelder, kreisteilungskörper und Schieberegistergolgen, Bibliographisches Institut, 1979
Jennings, PHD-Thesis,University of London, 1980
Berlekamp, Algebraic Coding Theory, Mac-Graw-Hill, 1968
Selmer, Linear Recurrences over Finite fields, Technical Report, University of Bergen, 1968
Beth/Hain et. al., Materialien zur Codierungstheorie II, University of Erlangen, 1979
Hain, Diplomarbeit, University of Erlangen, 1982
Beth/Heß/Wirl, Kryptographie — Eine Eingührung, Teubner, Stuttgart
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1983 Springer-Verlag Wien
About this chapter
Cite this chapter
Beth, T. (1983). Stream Ciphers. In: Longo, G. (eds) Secure Digital Communications. International Centre for Mechanical Sciences, vol 279. Springer, Vienna. https://doi.org/10.1007/978-3-7091-2640-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-7091-2640-0_3
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-81784-1
Online ISBN: 978-3-7091-2640-0
eBook Packages: Springer Book Archive