Research Article

Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves

Table 5

Comparison with other EC based stream ciphers.

Security Throughput Approx. number of output bits required to attack the system Period

Linear congruential generator [10]Secrecy of point
PBSG-B [15] Secrecy of point
Dual EC generator [14]
PBSG-A [15]
Proposed method