Results 31 to 40 of about 883,280 (384)

The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator

open access: yesApplied Sciences, 2021
In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of the system is
Fethi Dridi   +4 more
semanticscholar   +1 more source

Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]

open access: yesEngineering and Technology Journal, 2011
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj   +1 more source

Ultra-long-haul digital coherent PSK Y-00 quantum stream cipher transmission system.

open access: yesOptics Express, 2021
A record-long 10,118-km fiber transmission with physical layer encryption is demonstrated utilizing a Y-00 cipher based on signal masking by quantum (shot) noise.
K. Tanizawa, F. Futami
semanticscholar   +1 more source

Data‐driven performance metrics for neural network learning

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView., 2023
Summary Effectiveness of data‐driven neural learning in terms of both local mimima trapping and convergence rate is addressed. Such issues are investigated in a case study involving the training of one‐hidden‐layer feedforward neural networks with the extended Kalman filter, which reduces the search for the optimal network parameters to a state ...
Angelo Alessandri   +2 more
wiley   +1 more source

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers.
Sandip Karmakar, Dipanwita Roy Chowdhury
doaj   +1 more source

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +1 more source

Kangaroo A Proposed Stream Cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2010
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma   +1 more
doaj   +1 more source

Atom: A Stream Cipher with Double Key Filter

open access: yesIACR Transactions on Symmetric Cryptology, 2021
It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs to be at least twice the size of the length of its secret key.
Subhadeep Banik   +6 more
doaj   +1 more source

Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial [PDF]

open access: yesEngineering and Technology Journal, 2015
The increase in the speed of computers and adoption on it as means of encryption (send and receive encrypted data), which led to the development of modern encryption techniques such as (stream cipher and block cipher).
Zainab Mohammed Hussein   +1 more
doaj   +1 more source

Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT

open access: yesIEEE Internet of Things Journal, 2020
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is very important. In this article, cryptography-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic ...
Tianen Liu   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy