Results 41 to 50 of about 124,770 (378)
Improved Related-Cipher Attack on Salsa20 Stream Cipher
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
L. Ding
semanticscholar +1 more source
Effects of chronic browsing on life‐history traits of an irruptive large herbivore population
This study aimed to determine the relationship between diet quality, body mass, and size (hind foot length), and female reproduction and sought to identify the mechanism by which high density under severe food limitations is maintained. Our results demonstrated that sika deer introduced to Nakanoshima Island have maintained high densities through high ...
Koichi Kaji+9 more
wiley +1 more source
Fast software encryption system based on local pseudorandomness [PDF]
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed+3 more
doaj +1 more source
Authentication of data hiding using co-occurrence matrix [PDF]
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message ...
Melad saeed, Ghada thanoon
doaj +1 more source
Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi. Metode kriptografi yang digunakan untuk mengamankan pesan diantaranya adalah affine cipher dan cipher transposisi grup simetri.
Ilfi Nur Diana
doaj +1 more source
Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
V. Ghafari, Honggang Hu
semanticscholar +1 more source
This study examines the demographic dynamics of two seabird populations on Tromelin Island, 15 years after the eradication of brown rats. The results indicate that these populations are in good health and are expected to continue growing until breeding sites are saturated in about a century.
Merlène Saunier+6 more
wiley +1 more source
De novo variants of IRF2BPL result in developmental epileptic disorder
Background Pathogenic variants of the IRF2BPL gene have been reported to cause neurodevelopmental disorders; however, studies focused on IRF2BPL in zebrafish are limited.
Yong Wang+8 more
doaj +1 more source
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara+3 more
doaj +1 more source