Results 11 to 20 of about 3,667 (257)
A Description of the Rabbit Stream Cipher Algorithm [PDF]
M. Boesgaard, M. Vesterager, E. Zenner
openaire +2 more sources
An efficient Grain-80 stream cipher with unrolling features to enhance the throughput on hardware platform [PDF]
The stream cipher is a fundamental component of symmetric cryptography and offers unique implementation speed and scalability advantages. Additionally, the complexity of the cipher algorithm deployment environment forces new, appropriate designs and ...
Malode Vishwanatha Panduranga Rao+1 more
exaly +3 more sources
A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester [PDF]
Rabbit stream cipher is one of the finalists of eSTREAM project which uses 128-bit secret keys. Prior to us, the attacks on Rabbit has been all focused on the bias analysis and the best result showed the distinguishing attack with complexity 2136.
Nasser Ramazani Darmian
core +1 more source
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure [PDF]
مع التوسع الثوري في الإنترنت ، تتزايد المعلومات العالمية في تطبيق تكنولوجيا الاتصالات، ويعزز النمو السريع لحجم البيانات الكبير الحاجة إلى تحقيق تقنيات آمنة وقوية وواثقة باستخدام خوارزميات فعالة مختلفة.
Hasan, Mokhtar, Ibraheem, Noor
core +2 more sources
Trivium and Rabbit stream cipher [PDF]
Alshaikhli, Imad Fakhri Taha+4 more
core +1 more source
Applications of Fibonacci Sequences and Golden Ratio [PDF]
The study mainly focuses on the use of the Golden Ratio and the Fibonacci sequence. The connection between them can be clearly visible in nature. With the help of the Fib-onacci sequence scientists have solved many mysteries related to nature. Everything
Alok Kumar Verma+2 more
core +2 more sources
A Finite-Automaton Based Stream Cipher As a Quasigroup Based Cipher [PDF]
In this paper we show that a recently published finite automaton stream cipher can be considered as a quasigroup based stream cipher. Some additional properties of the discussed cipher are also given.
arxiv +1 more source
A fast and light stream cipher for smartphones [PDF]
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo+2 more
core +1 more source
Authenticated Encryption Methods for Feedback Control Systems [PDF]
Tilbakekoplingssystemer krever at signaler sendes mellom sensorer, tilstandsestimatorer, regulatorer og aktuatorer. Disse signalene er sårbare for tyvlytting, som gjør at uautoriserte aktører kan få kjennskap til potensielt konfidensielle system- og ...
Solnør, Petter
core
Slid Pairs of the Fruit-80 Stream Cipher [PDF]
Fruit is a small-state stream cipher designed for securing communications among resource-constrained devices. The design of Fruit was first known to the public in 2016.
Abdul Rani, Hazlin+2 more
core +2 more sources