Results 211 to 220 of about 486,134 (253)

Comparison the insertion attack effects on randomness property of Dragon and Rabbit stream cipher

open access: closed2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA), 2013
Pseudorandom generator as the heart of security system is a potential target by an adversary to weaken or derail the system performance. One possible active attack on a pseudorandom generator is an insertion attack on a random sequence generated by the pseudo random number generator, in order to reduce or even omit the randomness property of the output
Desi Wulandari   +3 more
semanticscholar   +3 more sources

Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)

open access: closedProceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithms of the ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. As the Rabbit evaluated the complexity of side-channel analysis
KiSeok Bae   +4 more
semanticscholar   +3 more sources

Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher

open access: closed2011 Developments in E-systems Engineering, 2011
In this paper a two Special Huffman Tree (SHT) algorithms have been designed and implemented to be encoded with an MPEG video file instead of the standard Huffman tree algorithm. The first SHT has been built with 89-entries, and the other with 100-entries. The SHTs are encrypted using part of the key-stream generated by Rabbit algorithm. The other part
Sufyan T. Faraj Al-Janabi   +2 more
semanticscholar   +3 more sources

Enhanced Stream Cipher Rabbit Secure Against Power Analysis Attack

open access: closedJournal of the Institute of Electronics and Information Engineers, 2013
Recently, stream cipher Rabbit was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. However, a feasibility of practical power analysis attack to algorithm in experiment was introduced.
KiSeok Bae   +3 more
semanticscholar   +3 more sources

Performance enhancement of DSSS using rabbit Stream cipher

open access: closed2011 IEEE International Conference on Control System, Computing and Engineering, 2011
Over the last 50 years, a class of modulation techniques usually called “Spread Spectrum,” has been developed. This group of modulation techniques is characterized by its wide frequency spectra. The modulated output signals occupy a much greater bandwidth than the signal's baseband information bandwidth.
S. Sharmila, G. Umamaheshwari
semanticscholar   +3 more sources

The Rabbit Stream Cipher

open access: closedThe eSTREAM Finalists, 2008
Martin Boesgaard   +2 more
semanticscholar   +3 more sources

Nonlinear System as a Stream-Cipher

2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), 2020
A new stream cipher based on a nonlinear system. The scheme follow the structure of a Nonlinear-feedback Shift Register (NLFSR). However, it does not exhibit the cryptographic drawbacks as the NLFSR does such as an unpredictable maximal period of the ...
Rhouma Rhouma, Rabei Becheikh
semanticscholar   +1 more source

Analysis of the IEEE 802.15.4 Protocol with Rabbit Encryption Algorithm for Industrial Applications in Oil and Gas Sector

2019 16th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering, 2019
The IEEE 802.15.4 is the most common standard development protocol that is applied to the current industrial wireless sensor network. Specific standards and requirement for IWSN has been regulated by international standard organization, which consider ...
R. Gándara, M. Alaydrus
semanticscholar   +1 more source

Rabbit-256 Optimisation for Secure Blockchain Hashing in IoT-Healthcare Data

˜Al-œKhawarizmi engineering journal
The recent trend towards the use of a blockchain as a means to guarantee the security of health data has raised concerns with regard to its applicability in Internet of Things (IoT) scenarios due to computationally heavy primitives (e.g.
Khalid Jadaa   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy