Results 1 to 10 of about 25,976 (323)

Quantum Stream Cipher Based on Holevo–Yuen Theory [PDF]

open access: yesEntropy, 2022
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj   +2 more sources

Application of a MEMS-Based TRNG in a Chaotic Stream Cipher [PDF]

open access: yesSensors, 2017
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Miguel Garcia-Bosque   +3 more
doaj   +2 more sources

Quantum Stream Cipher Based on Holevo–Yuen Theory: Part II [PDF]

open access: yesEntropy
This paper discusses the foundation of security theory for the Quantum stream cipher based on the Holevo–Yuen theory, which allows the use of “optical amplifiers”.
Osamu Hirota, Masaki Sohma
doaj   +2 more sources

A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher [PDF]

open access: goldApplied Sciences
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity and are widely used in pseudo-random number generators. However, their period is limited, related to the rule and the number of cells.
Peng Du, Youheng Dong, Qi Cui, Hui Li
doaj   +2 more sources

A SUGGESTED SUPER SALSA STREAM CIPHER [PDF]

open access: diamondIraqi Journal for Computers and Informatics, 2018
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj   +3 more sources

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments [PDF]

open access: yesEntropy, 2018
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
Vahid Amin Ghafari, Honggang Hu
doaj   +2 more sources

A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform [PDF]

open access: yesEntropy, 2018
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj   +2 more sources

Improvement Majority Function in A5/1 stream cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless communication.
Hala Bahjat, Mohanad Ali
doaj   +1 more source

Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]

open access: yesJisuanji kexue, 2023
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj   +1 more source

A Modification on Key Stream Generator for RC4 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2020
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj   +1 more source

Home - About - Disclaimer - Privacy