Research Article
Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves
Table 5
Comparison with other EC based stream ciphers.
| | Security | Throughput | Approx. number of output bits required to attack the system | Period |
| Linear congruential generator [10] | Secrecy of point | | — | | PBSG-B [15] | Secrecy of point | | — | | Dual EC generator [14] | | | | — | PBSG-A [15] | | | | | Proposed method | | | | |
|
|