Results 1 to 10 of about 25,616 (323)

Quantum Stream Cipher Based on Holevo–Yuen Theory [PDF]

open access: yesEntropy, 2022
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj   +2 more sources

Application of a MEMS-Based TRNG in a Chaotic Stream Cipher [PDF]

open access: yesSensors, 2017
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Miguel Garcia-Bosque   +3 more
doaj   +2 more sources

Quantum Stream Cipher Based on Holevo–Yuen Theory: Part II [PDF]

open access: yesEntropy
This paper discusses the foundation of security theory for the Quantum stream cipher based on the Holevo–Yuen theory, which allows the use of “optical amplifiers”.
Osamu Hirota, Masaki Sohma
doaj   +2 more sources

Nonlinear Equivalence of Stream Ciphers [PDF]

open access: bronze, 2010
In this paper we investigate nonlinear equivalence of stream ciphers over a finite field, exemplified by the pure LFSR-based filter generator over F2. We define a nonlinear equivalence class consisting of filter generators of length n that generate a binary keystream of period dividing 2n-1, and investigate certain cryptographic properties of the ...
Sondre Rønjom, Carlos Cid
openalex   +9 more sources

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments [PDF]

open access: yesEntropy, 2018
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
Vahid Amin Ghafari, Honggang Hu
doaj   +2 more sources

Stream cipher based on quasigroup string transformations in $Z_p^*$

open access: green, 2004
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Danilo Gligoroski
openalex   +5 more sources

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: green, 2010
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
David Arroyo   +3 more
openalex   +4 more sources

A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform [PDF]

open access: yesEntropy, 2018
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj   +2 more sources

Chaos for Stream Cipher

open access: green, 2001
8 pages 6 ...
Ninan Sajeeth Philip, K. Babu Joseph
openalex   +4 more sources

Stream Cipher Using Genetic Algorithm [PDF]

open access: goldAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
The research tackles newly suggested method  in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key ...
Melad saeed
doaj   +2 more sources

Home - About - Disclaimer - Privacy