It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 01610nam 2200289 a 45 0
001 a185429
008 970512s1993 caua b f000|0 eng d
040 $aCMontNP$cCMontNP
086 0 $aD 208.14/2:NPS-MA-93-016
100 1 $aLeader, Jeffery J.
245 10 $aNeural network identification of keystream generators /$cby Jeffery J. Leader, James E. Heyman.
260 $aMonterey, Calif. :$bNaval Postgraduate School ;$aSpringfield, Va. :$bAvailable from National Technical Information Service,$c[1993]
300 $a1 v. (various pagings) :$bill. ;$c28 cm.
500 $aCover title.
500 $a"NPS-MA-93-016."
500 $a"Technical report for period January 1993 - March 1993."
500 $aAD-A265 778.
504 $aIncludes bibliographical references.
520 $aApplications such as stream ciphers and spread spectra require the generation of binary keystreams to implement, and the simulation of such keystreams to break. Most cryptanalytic attacks are of the known generator type, that is, they assume knowledge of the method used to generate the keystream. We show that a neural network can be used to identify the generator, and in some cases to simulate the keystream.... Keystream generators.
592 $aaq/aq cc:9116 05/12/97
650 4 $aNEURAL NETS.
650 4 $aPSEUDO RANDOM SEQUENCES.
700 1 $aHeyman, James E.
710 2 $aNaval Postgraduate School (U.S.).$bDept. of Mathematics.
740 01 $aNPS-MA-93-016.
926 $aNPS-LIB$bDIGIPROJ$cD 208.14/2:NPS-MA-93-016$dBOOK$eNEVER$f1
926 $aNPS-LIB$bFEDDOCS$cD 208.14/2:NPS-MA-93-016$dBOOK$f2