Results 1 to 10 of about 877,768 (275)
Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments [PDF]
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
Vahid Amin Ghafari, Honggang Hu
doaj +3 more sources
A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform [PDF]
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj +3 more sources
Quantum Stream Cipher Based on Holevo–Yuen Theory [PDF]
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj +2 more sources
Atom: A Stream Cipher with Double Key Filter
It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs to be at least twice the size of the length of its secret key.
Subhadeep Banik +6 more
doaj +2 more sources
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size.
Matthias Hamann +3 more
doaj +2 more sources
Application of a MEMS-Based TRNG in a Chaotic Stream Cipher [PDF]
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Miguel Garcia-Bosque +3 more
doaj +2 more sources
Quantum Stream Cipher Based on Holevo–Yuen Theory: Part II [PDF]
This paper discusses the foundation of security theory for the Quantum stream cipher based on the Holevo–Yuen theory, which allows the use of “optical amplifiers”.
Osamu Hirota, Masaki Sohma
doaj +2 more sources
Improved Related-Cipher Attack on Salsa20 Stream Cipher
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj +2 more sources
A SUGGESTED SUPER SALSA STREAM CIPHER [PDF]
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj +3 more sources
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption [PDF]
The need for medical image encryption is increasingly pronounced, for example, to safeguard the privacy of the patients’ medical imaging data. In this article, a novel deep learning-based key generation network (DeepKeyGen) is proposed as a stream cipher
Yi Ding +5 more
semanticscholar +1 more source

