Stream Ciphers

  • Thomas Beth
Part of the International Centre for Mechanical Sciences book series (CISM, volume 279)


In any communication system the users face the problem of protecting the transmitted data against a loss of their — objective or subjective — quality.


Block Cipher Cyclic Code Stream Cipher Linear Equivalent Linear Feedback Shift Register 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kahn, The Codebreakes, McMillan, 1982Google Scholar
  2. 2.
    Beker/Piper, Ciphes-System — The Protection of Communications, Northwood, 1982Google Scholar
  3. 3.
    Konheim, Cryptography: A Primer, Wiley, 1981Google Scholar
  4. 4.
    Ryska/Herda, Kryptographische Verfahren in des Datenverarbeitung,Springer, 1980Google Scholar
  5. 5.
    Lüneburg, Galoisgelder, kreisteilungskörper und Schieberegistergolgen, Bibliographisches Institut, 1979Google Scholar
  6. 6.
    Jennings, PHD-Thesis,University of London, 1980Google Scholar
  7. 7.
    Berlekamp, Algebraic Coding Theory, Mac-Graw-Hill, 1968Google Scholar
  8. 8.
    Selmer, Linear Recurrences over Finite fields, Technical Report, University of Bergen, 1968Google Scholar
  9. 9.
    Beth/Hain et. al., Materialien zur Codierungstheorie II, University of Erlangen, 1979Google Scholar
  10. 10.
    Hain, Diplomarbeit, University of Erlangen, 1982Google Scholar
  11. 11.
    Beth/Heß/Wirl, Kryptographie — Eine Eingührung, Teubner, StuttgartGoogle Scholar

Copyright information

© Springer-Verlag Wien 1983

Authors and Affiliations

  • Thomas Beth
    • 1
  1. 1.Universität Erlangen-NürnbergGermany

Personalised recommendations