Results 1 to 10 of about 2,745 (122)

Rabbit: A New High-Performance Stream Cipher [PDF]

open access: yesLecture Notes in Computer Science, 2003
We present a new stream cipher, Rabbit, based on iterating a set of coupled non-linear functions. Rabbit is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor.
Martin Boesgaard   +4 more
exaly   +2 more sources

On the security of consumer wearable devices in the Internet of Things. [PDF]

open access: yesPLoS One, 2018
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing.
Tahir H, Tahir R, McDonald-Maier K.
europepmc   +4 more sources

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

open access: yesJournal of Information and Communication Convergence Engineering, 2014
In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv’s Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the
Bruce Ndibanje
exaly   +2 more sources

Pseudorandom number generator using Rabbit cipher

open access: yesApplied Mathematical Sciences, 2015
Random Number Generators (RNGs) are applied in a wide variety of cryptographic operations such as cryptographic computer security protocols, encryption algorithms, and keystreams. Stream ciphers employ an encryption transformation which varies with time.
A. H. Kashmar, E. S. Ismail
exaly   +2 more sources

Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm

open access: yesProcedia Computer Science, 2018
Abstract Employee mobility is an important issue for companies that have a goal to become global company. The company often asks the employees to do some assignments outside the office area, either inside or outside of their home country. A portable virtual private network (VPN) is a device that enables the employees to perform remote access ...
Nico Surantha
exaly   +2 more sources

Kangaroo A Proposed Stream Cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2010
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma   +1 more
doaj   +1 more source

Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight

open access: yesInternational journal of health sciences, 2022
The encryption of digital images plays a very important role in maintaining privacy and security, in order to protect the people, like witnesses. So, an individual image must be encrypted before it is sent over the Internet to the intended recipient. In this paper, images are encrypted using the rabbit algorithm and the chaotic equation represented by ...
Tameem Hameed Obaida   +2 more
openaire   +1 more source

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Hardware optimizations of stream cipher rabbit [PDF]

open access: yesTatra Mountains Mathematical Publications, 2011
ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute effi­ciently in hardware.
openaire   +1 more source

A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption

open access: yesIraqi Journal of Science, 2023
     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa,
Mohammed Gheni Alwan   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy