Results 1 to 10 of about 869,930 (383)

Application of a MEMS-Based TRNG in a Chaotic Stream Cipher. [PDF]

open access: yesSensors (Basel), 2017
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Garcia-Bosque M   +3 more
europepmc   +7 more sources

Stream cipher based on quasigroup string transformations in $Z_p^*$ [PDF]

open access: greenarXiv, 2004
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core   +5 more sources

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments. [PDF]

open access: yesEntropy (Basel), 2018
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
Amin Ghafari V, Hu H.
europepmc   +3 more sources

A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform. [PDF]

open access: yesEntropy (Basel), 2018
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Fan C, Ding Q.
europepmc   +3 more sources

Quantum Stream Cipher Based on Holevo-Yuen Theory. [PDF]

open access: yesEntropy (Basel), 2022
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Sohma M, Hirota O.
europepmc   +2 more sources

Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems [PDF]

open access: yesBaghdad Science Journal, 2020
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj   +3 more sources

Quantum Stream Cipher Based on Holevo-Yuen Theory: Part II. [PDF]

open access: yesEntropy (Basel)
This paper discusses the foundation of security theory for the Quantum stream cipher based on the Holevo–Yuen theory, which allows the use of “optical amplifiers”.
Hirota O, Sohma M.
europepmc   +2 more sources

Hybrid Cipher System using Neural Network [PDF]

open access: yesBaghdad Science Journal, 2008
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to ...
Baghdad Science Journal
doaj   +3 more sources

Quantum stream cipher by Yuen 2000 protocol: Design and experiment by intensity modulation scheme [PDF]

open access: green, 2005
This paper shall investigate Yuen protocol, so called Y-00, which can realize a randomized stream cipher with high bit rate(Gbps) for long distance(several hundreds km). The randomized stream cipher with randomization by quantum noise based on Y-00 is called quantum stream cipher in this paper, and it may have security against known plaintext attacks ...
Osamu Hirota   +3 more
arxiv   +3 more sources

COZMO-A New Lightweight Stream Cipher [PDF]

open access: yes2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), 2018
This paper deals with the merger of the two lightweight stream ciphers: A5by1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher will act as the input of the A5by1 cipher.
Bonnerji, Rhea   +3 more
arxiv   +7 more sources

Home - About - Disclaimer - Privacy