Results 1 to 10 of about 26,227 (226)
Quantum Stream Cipher Based on Holevo–Yuen Theory: Part II [PDF]
This paper discusses the foundation of security theory for the Quantum stream cipher based on the Holevo–Yuen theory, which allows the use of “optical amplifiers”.
Osamu Hirota, Masaki Sohma
doaj +4 more sources
Quantum Stream Cipher Based on Holevo–Yuen Theory [PDF]
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj +2 more sources
Application of a MEMS-Based TRNG in a Chaotic Stream Cipher [PDF]
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Miguel Garcia-Bosque +3 more
doaj +2 more sources
Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments [PDF]
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
Vahid Amin Ghafari, Honggang Hu
doaj +2 more sources
A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform [PDF]
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj +2 more sources
Implementation of super H-antimagic total graph on establishing stream cipher
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko +2 more
doaj +3 more sources
Stream Cipher Using Genetic Algorithm [PDF]
The research tackles newly suggested method in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key ...
Melad saeed
doaj +2 more sources
Towards Low Energy Stream Ciphers
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags.
Subhadeep Banik +7 more
doaj +5 more sources
Improvement Majority Function in A5/1 stream cipher Algorithm [PDF]
Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless communication.
Hala Bahjat, Mohanad Ali
doaj +1 more source
Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj +1 more source

