Results 1 to 10 of about 23,338 (116)

A novel H.264 SVC encryption scheme for secure bit-rate transcoding [PDF]

open access: yes, 2009
This paper presents a novel architecture for the secure delivery of encrypted H.264 SVC bitstreams. It relies on a block cipher and stream cipher used in a novel way that would allow an intermediary transcoder to truncate the bitstream to the appropriate
Bull, DR, Redmill, DW, Thomas, NM
core   +2 more sources

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: yes, 2009
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo   +3 more
core   +2 more sources

On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]

open access: yes, 2006
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa   +14 more
core   +3 more sources

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Transparent code authentication at the processor level [PDF]

open access: yes, 2009
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim   +32 more
core   +2 more sources

Quantum Noise Randomized Ciphers

open access: yes, 2006
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy