Book contents
- Frontmatter
- Contents
- Contributors
- Introduction
- I NUMBER THEORETIC ASPECTS OF CRYPTOLOGY
- II CRYPTOGRAPHIC DEVICES AND APPLICATIONS
- 7 Security in telecommunication services over the next decade
- 8 Linear feedback shift registers and stream ciphers
- 9 Applying randomness tests to commercial level block ciphers
- 10 Pseudo-random sequence generators using structured noise
- 11 Privacy for MACNET
- 12 Authentication
- 13 Insecurity of the knapsack one-time pad
- 14 The tactical frequency management problem: heuristic search and simulated annealing
- 15 Reed-Solomon coding in the complex field
- PART III DIOPHANTINE ANALYSIS
7 - Security in telecommunication services over the next decade
Published online by Cambridge University Press: 05 May 2013
- Frontmatter
- Contents
- Contributors
- Introduction
- I NUMBER THEORETIC ASPECTS OF CRYPTOLOGY
- II CRYPTOGRAPHIC DEVICES AND APPLICATIONS
- 7 Security in telecommunication services over the next decade
- 8 Linear feedback shift registers and stream ciphers
- 9 Applying randomness tests to commercial level block ciphers
- 10 Pseudo-random sequence generators using structured noise
- 11 Privacy for MACNET
- 12 Authentication
- 13 Insecurity of the knapsack one-time pad
- 14 The tactical frequency management problem: heuristic search and simulated annealing
- 15 Reed-Solomon coding in the complex field
- PART III DIOPHANTINE ANALYSIS
Summary

- Type
- Chapter
- Information
- Number Theory and Cryptography , pp. 98 - 105Publisher: Cambridge University PressPrint publication year: 1990