Kangaroo A Proposed Stream Cipher Algorithm [PDF]
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma+1 more
doaj +4 more sources
On the security of consumer wearable devices in the Internet of Things. [PDF]
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing.
Tahir H, Tahir R, McDonald-Maier K.
europepmc +4 more sources
An efficient Grain-80 stream cipher with unrolling features to enhance the throughput on hardware platform [PDF]
The stream cipher is a fundamental component of symmetric cryptography and offers unique implementation speed and scalability advantages. Additionally, the complexity of the cipher algorithm deployment environment forces new, appropriate designs and ...
Malode Vishwanatha Panduranga Rao+1 more
exaly +3 more sources
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security.
Mohammed Gheni Alwan+2 more
semanticscholar +1 more source
Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight
The encryption of digital images plays a very important role in maintaining privacy and security, in order to protect the people, like witnesses. So, an individual image must be encrypted before it is sent over the Internet to the intended recipient.
Tameem Hameed Obaida+2 more
semanticscholar +1 more source
Performance Analysis of Hybrid Cryptographic Algorithms Rabbit Stream and Enhanced Dual RSA
Cryptography is a technique for encoding data by encrypting plaintext into an unreadable (meaningless) form. Cryptographic methods have good and bad performance depending on the type of algorithm we use. Therefore, the purpose of this study is to measure
Demonius Sarumaha+2 more
semanticscholar +1 more source
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure [PDF]
مع التوسع الثوري في الإنترنت ، تتزايد المعلومات العالمية في تطبيق تكنولوجيا الاتصالات، ويعزز النمو السريع لحجم البيانات الكبير الحاجة إلى تحقيق تقنيات آمنة وقوية وواثقة باستخدام خوارزميات فعالة مختلفة.
Hasan, Mokhtar, Ibraheem, Noor
core +2 more sources
A Finite-Automaton Based Stream Cipher As a Quasigroup Based Cipher [PDF]
In this paper we show that a recently published finite automaton stream cipher can be considered as a quasigroup based stream cipher. Some additional properties of the discussed cipher are also given.
arxiv +1 more source
Applications of Fibonacci Sequences and Golden Ratio [PDF]
The study mainly focuses on the use of the Golden Ratio and the Fibonacci sequence. The connection between them can be clearly visible in nature. With the help of the Fib-onacci sequence scientists have solved many mysteries related to nature. Everything
Alok Kumar Verma+2 more
core +2 more sources
A fast and light stream cipher for smartphones [PDF]
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo+2 more
core +1 more source