Results 211 to 220 of about 486,134 (253)
Comparison the insertion attack effects on randomness property of Dragon and Rabbit stream cipher
Pseudorandom generator as the heart of security system is a potential target by an adversary to weaken or derail the system performance. One possible active attack on a pseudorandom generator is an insertion attack on a random sequence generated by the pseudo random number generator, in order to reduce or even omit the randomness property of the output
Desi Wulandari +3 more
semanticscholar +3 more sources
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)
Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithms of the ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. As the Rabbit evaluated the complexity of side-channel analysis
KiSeok Bae +4 more
semanticscholar +3 more sources
Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher
In this paper a two Special Huffman Tree (SHT) algorithms have been designed and implemented to be encoded with an MPEG video file instead of the standard Huffman tree algorithm. The first SHT has been built with 89-entries, and the other with 100-entries. The SHTs are encrypted using part of the key-stream generated by Rabbit algorithm. The other part
Sufyan T. Faraj Al-Janabi +2 more
semanticscholar +3 more sources
Enhanced Stream Cipher Rabbit Secure Against Power Analysis Attack
Recently, stream cipher Rabbit was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. However, a feasibility of practical power analysis attack to algorithm in experiment was introduced.
KiSeok Bae +3 more
semanticscholar +3 more sources
Performance enhancement of DSSS using rabbit Stream cipher
Over the last 50 years, a class of modulation techniques usually called “Spread Spectrum,” has been developed. This group of modulation techniques is characterized by its wide frequency spectra. The modulated output signals occupy a much greater bandwidth than the signal's baseband information bandwidth.
S. Sharmila, G. Umamaheshwari
semanticscholar +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Nonlinear System as a Stream-Cipher
2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), 2020A new stream cipher based on a nonlinear system. The scheme follow the structure of a Nonlinear-feedback Shift Register (NLFSR). However, it does not exhibit the cryptographic drawbacks as the NLFSR does such as an unpredictable maximal period of the ...
Rhouma Rhouma, Rabei Becheikh
semanticscholar +1 more source
2019 16th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering, 2019
The IEEE 802.15.4 is the most common standard development protocol that is applied to the current industrial wireless sensor network. Specific standards and requirement for IWSN has been regulated by international standard organization, which consider ...
R. Gándara, M. Alaydrus
semanticscholar +1 more source
The IEEE 802.15.4 is the most common standard development protocol that is applied to the current industrial wireless sensor network. Specific standards and requirement for IWSN has been regulated by international standard organization, which consider ...
R. Gándara, M. Alaydrus
semanticscholar +1 more source
Rabbit-256 Optimisation for Secure Blockchain Hashing in IoT-Healthcare Data
˜Al-œKhawarizmi engineering journalThe recent trend towards the use of a blockchain as a means to guarantee the security of health data has raised concerns with regard to its applicability in Internet of Things (IoT) scenarios due to computationally heavy primitives (e.g.
Khalid Jadaa +3 more
semanticscholar +1 more source

