Results 41 to 50 of about 124,770 (378)

Improved Related-Cipher Attack on Salsa20 Stream Cipher

open access: yesIEEE Access, 2019
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
L. Ding
semanticscholar   +1 more source

Effects of chronic browsing on life‐history traits of an irruptive large herbivore population

open access: yesPopulation Ecology, EarlyView.
This study aimed to determine the relationship between diet quality, body mass, and size (hind foot length), and female reproduction and sought to identify the mechanism by which high density under severe food limitations is maintained. Our results demonstrated that sika deer introduced to Nakanoshima Island have maintained high densities through high ...
Koichi Kaji   +9 more
wiley   +1 more source

Fast software encryption system based on local pseudorandomness [PDF]

open access: yesComputer Science Journal of Moldova, 1996
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj  

FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher

open access: yesSensors, 2019
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed   +3 more
doaj   +1 more source

Authentication of data hiding using co-occurrence matrix [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2012
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message ...
Melad saeed, Ghada thanoon
doaj   +1 more source

Algoritma Super Enkripsi (Affine Cipher dan Cipher Transposisi Grup Simetri) untuk Mengamankan Pesan Teks

open access: yesKubik, 2022
Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi. Metode kriptografi yang digunakan untuk mengamankan pesan diantaranya adalah affine cipher dan cipher transposisi grup simetri.
Ilfi Nur Diana
doaj   +1 more source

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments

open access: yesEntropy, 2018
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
V. Ghafari, Honggang Hu
semanticscholar   +1 more source

Combining transient dynamics and logistic‐asymptotic growth to study the recovery of two seabird populations after rat eradication

open access: yesPopulation Ecology, EarlyView.
This study examines the demographic dynamics of two seabird populations on Tromelin Island, 15 years after the eradication of brown rats. The results indicate that these populations are in good health and are expected to continue growing until breeding sites are saturated in about a century.
Merlène Saunier   +6 more
wiley   +1 more source

De novo variants of IRF2BPL result in developmental epileptic disorder

open access: yesOrphanet Journal of Rare Diseases
Background Pathogenic variants of the IRF2BPL gene have been reported to cause neurodevelopmental disorders; however, studies focused on IRF2BPL in zebrafish are limited.
Yong Wang   +8 more
doaj   +1 more source

A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices

open access: yesSensors, 2018
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy