Results 1 to 10 of about 880,434 (384)
Application of a MEMS-Based TRNG in a Chaotic Stream Cipher [PDF]
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Miguel Garcia-Bosque+3 more
doaj +7 more sources
Stream cipher based on quasigroup string transformations in $Z_p^*$ [PDF]
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string transformations. The cryptographical strength of the proposed stream cipher is based on the fact that breaking
Gligoroski, Danilo
arxiv +6 more sources
Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments [PDF]
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
Vahid Amin Ghafari, Honggang Hu
doaj +3 more sources
A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform [PDF]
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj +3 more sources
Quantum Stream Cipher Based on Holevo–Yuen Theory [PDF]
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj +2 more sources
Quantum Stream Cipher Based on Holevo–Yuen Theory: Part II [PDF]
This paper discusses the foundation of security theory for the Quantum stream cipher based on the Holevo–Yuen theory, which allows the use of “optical amplifiers”.
Osamu Hirota, Masaki Sohma
doaj +2 more sources
Quantum stream cipher by Yuen 2000 protocol: Design and experiment by intensity modulation scheme [PDF]
This paper shall investigate Yuen protocol, so called Y-00, which can realize a randomized stream cipher with high bit rate(Gbps) for long distance(several hundreds km). The randomized stream cipher with randomization by quantum noise based on Y-00 is called quantum stream cipher in this paper, and it may have security against known plaintext attacks ...
Osamu Hirota+3 more
arxiv +3 more sources
Nonlinear Equivalence of Stream Ciphers [PDF]
In this paper we investigate nonlinear equivalence of stream ciphers over a finite field, exemplified by the pure LFSR-based filter generator over F2. We define a nonlinear equivalence class consisting of filter generators of length n that generate a binary keystream of period dividing 2n-1, and investigate certain cryptographic properties of the ...
Sondre Rønjom, Carlos Cid
openalex +9 more sources
COZMO-A New Lightweight Stream Cipher [PDF]
This paper deals with the merger of the two lightweight stream ciphers: A5by1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher will act as the input of the A5by1 cipher.
Bonnerji, Rhea+3 more
arxiv +7 more sources
The Internet plays an essential role in modern societies and in the amount of sensitive data transported over the optical networks that shows its' importance has increased drastically.
Fumio Futami+2 more
exaly +2 more sources