Results 11 to 20 of about 3,667 (257)

An efficient Grain-80 stream cipher with unrolling features to enhance the throughput on hardware platform [PDF]

open access: yesIndonesian Journal of Electrical Engineering and Computer Science
The stream cipher is a fundamental component of symmetric cryptography and offers unique implementation speed and scalability advantages. Additionally, the complexity of the cipher algorithm deployment environment forces new, appropriate designs and ...
Malode Vishwanatha Panduranga Rao   +1 more
exaly   +3 more sources

A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester [PDF]

open access: closed, 2013
Rabbit stream cipher is one of the finalists of eSTREAM project which uses 128-bit secret keys. Prior to us, the attacks on Rabbit has been all focused on the bias analysis and the best result showed the distinguishing attack with complexity 2136.
Nasser Ramazani Darmian
core   +1 more source

Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure [PDF]

open access: yes, 2020
مع التوسع الثوري في الإنترنت ، تتزايد المعلومات العالمية في تطبيق تكنولوجيا الاتصالات، ويعزز النمو السريع لحجم البيانات الكبير الحاجة إلى تحقيق تقنيات آمنة وقوية وواثقة باستخدام خوارزميات فعالة مختلفة.
Hasan, Mokhtar, Ibraheem, Noor
core   +2 more sources

Trivium and Rabbit stream cipher [PDF]

open access: closed, 2011
Alshaikhli, Imad Fakhri Taha   +4 more
core   +1 more source

Applications of Fibonacci Sequences and Golden Ratio [PDF]

open access: yes, 2023
The study mainly focuses on the use of the Golden Ratio and the Fibonacci sequence. The connection between them can be clearly visible in nature. With the help of the Fib-onacci sequence scientists have solved many mysteries related to nature. Everything
Alok Kumar Verma   +2 more
core   +2 more sources

A Finite-Automaton Based Stream Cipher As a Quasigroup Based Cipher [PDF]

open access: yesEPTCS 367, 2022, pp. 81-87, 2022
In this paper we show that a recently published finite automaton stream cipher can be considered as a quasigroup based stream cipher. Some additional properties of the discussed cipher are also given.
arxiv   +1 more source

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Authenticated Encryption Methods for Feedback Control Systems [PDF]

open access: yes, 2021
Tilbakekoplingssystemer krever at signaler sendes mellom sensorer, tilstandsestimatorer, regulatorer og aktuatorer. Disse signalene er sårbare for tyvlytting, som gjør at uautoriserte aktører kan få kjennskap til potensielt konfidensielle system- og ...
Solnør, Petter
core  

Slid Pairs of the Fruit-80 Stream Cipher [PDF]

open access: yes, 2022
Fruit is a small-state stream cipher designed for securing communications among resource-constrained devices. The design of Fruit was first known to the public in 2016.
Abdul Rani, Hazlin   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy