Results 1 to 10 of about 855,584 (255)
A SUGGESTED SUPER SALSA STREAM CIPHER [PDF]
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj +4 more sources
A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher [PDF]
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity and are widely used in pseudo-random number generators. However, their period is limited, related to the rule and the number of cells.
Peng Du, Youheng Dong, Qi Cui, Hui Li
doaj +2 more sources
Improved Related-Cipher Attack on Salsa20 Stream Cipher
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj +2 more sources
Application of a MEMS-Based TRNG in a Chaotic Stream Cipher
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Miguel Garcia-Bosque +3 more
doaj +2 more sources
Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
Vahid Amin Ghafari, Honggang Hu
doaj +2 more sources
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj +2 more sources
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption [PDF]
The need for medical image encryption is increasingly pronounced, for example, to safeguard the privacy of the patients’ medical imaging data. In this article, a novel deep learning-based key generation network (DeepKeyGen) is proposed as a stream cipher
Yi Ding +5 more
semanticscholar +1 more source
Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map
In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices.
A. T. Maolood +2 more
semanticscholar +1 more source
Improvement Majority Function in A5/1 stream cipher Algorithm [PDF]
Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless communication.
Hala Bahjat, Mohanad Ali
doaj +1 more source
Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj +1 more source

