Results 21 to 30 of about 17,540 (171)

A practical attack on the fixed RC4 in the wep mode [PDF]

open access: yes, 2005
. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4
A. Maximov   +14 more
core   +1 more source

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Parallel distributed compensation scheme for chaotic masking system via Rivest cipher 4 stream cipher

open access: yesIET Control Theory & Applications, 2023
This study presents a design methodology for Takagi‐Sugeno (T‐S) fuzzy models‐based secure communications in multiple time‐delay chaotic (MTDC) systems with Rivest cipher 4 (RC4) algorithm.
Feng‐Hsiag Hsiao
doaj   +1 more source

Congener-Specific Numbering Systems for the Environmentally Relevant C4 through C8 Perfluorinated Homologue Groups of Alkyl Sulfonates, Carboxylates, Telomer Alcohols and Acids, and Their Derivatives [PDF]

open access: yes, 2008
We introduce a congener-specific numbering system for the C4 through C8 perfluorinated homologue groups of alkyl sulfonates, carboxylates, telomer alcohols and acids, and their derivatives.
Kaya Forest   +3 more
core   +3 more sources

Pengamanan Dokumen Menggunakan Kriptografi Rc4 Dan Steganografi Eof Dengan Media Video Mp4 Pada CV. Synergy Selaras [PDF]

open access: yes, 2017
Masalah keamanan dan kerahasiaan data proyek merupakan aspek yang sangat penting di Perusahaan kontraktor. CV. Synergy Selaras merupakan Perusahaan yang bergerak di bidang kontraktor.
Darmawan, S. (Syahputra)   +1 more
core   +2 more sources

Generalization of Roos bias in RC4 and some results on key-keystream relations

open access: yesJournal of Mathematical Cryptology, 2018
RC4 has attracted many cryptologists due to its simple structure. In [9], Paterson, Poettering and Schuldt reported the results of a large scale computation of RC4 biases.
Dey Sabyasachi, Sarkar Santanu
doaj   +1 more source

Implementasi Algoritma Kriptografi RC4 Pada DSP TMS320C6713 Sebagai Pendukung Sekuritas Jaringan Komunikasi Voice over Internet Protocol (VoIP)

open access: yesJurnal EECCIS (Electrics, Electronics, Communications, Controls, Informatics, Systems), 2013
Perkembangan teknologi VoIP yang berbasis IP dapat memberikan efek samping, seperti penyadapan yang tidak menguntungkan bagi pengguna teknologi tersebut.
Muhammad Fauzan Edy Purnomo   +4 more
doaj   +1 more source

Penerapan Algoritma Rivert Code 4 (Rc 4) Pada Aplikasi Kriptografi Dokumen [PDF]

open access: yes, 2018
The development of information technology, has made the information as a basic requirement for everyone. To secure the information we have, one of the techniques of data and information security is cryptography. Therefore, the authors make an application
Jurnal, R. T. (Redaksi)
core   +3 more sources

Combination and comparison of AES and RC4 cryptography in least significant bit (LSB) method in digital image to improve message security

open access: yesJurnal Informatika, 2018
Message security is something that must be kept secretly. However, to maintain the security and the secret of a message it takes two different methods. To maintain the security of messages, the science that has been widely used is to use cryptography. As
Rahmat Sulaiman
doaj   +1 more source

Home - About - Disclaimer - Privacy