Results 91 to 100 of about 28,041 (324)
An Image Compression Encryption Algorithm Based on Chaos and ZUC Stream Cipher. [PDF]
Song X, Shi M, Zhou Y, Wang E.
europepmc +1 more source
The Salsa20 Family of Stream Ciphers [PDF]
Salsa20 is a family of 256-bit stream ciphers designed in 2005 and submitted to eSTREAM, the ECRYPT Stream Cipher Project. Salsa20 has progressed to the third round of eSTREAM without any changes. The 20-round stream cipher Salsa20/20 is consistently faster than AES and is recommended by the designer for typical cryptographic applications.
openaire +2 more sources
The relationship between primary polymer structure and pattern quality in the directed self‐assembly of chemically modified polystyrene‐block‐poly(methyl methacrylate) derivatives is explored. The perpendicular lamellae are aligned, with a periodicity below 20 nm. No parallel orientations or dislocations form, and line patterns are well defined over an
Shinsuke Maekawa+8 more
wiley +1 more source
Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. [PDF]
Madarro-Capó EJ+3 more
europepmc +1 more source
A reconfigurable and multidirectional interdigital transducer (M‐IDT) on a flexible printed circuit board provides a practical platform for acoustofluidic research. It simplifies and accelerates prototyping, enabling cost‐effective exploration of wave modes and fluid dynamics.
Mercedes Stringer+11 more
wiley +1 more source
Implementation of a Stream Cipher Based on Bernoulli's Map [PDF]
A stream cipher was implemented on a FPGA. The keystream, for some authors the most important element, was developed using an algorithm based on Bernoullis chaotic map. When dynamic systems are digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a mechanism was needed.
arxiv
In this article, a water‐evaporation driven energy harvester is devised that works even in the absence of sunlight. This is achieved by combining PVA hydrogel with thermoelectrics (TEG) to directly capture energy from water evaporation. Under mild conditions (RH 40%, T of 26 °C, and 2.8 m s−1 wind), 1.71 mW (1.02 W m−2) power can be generated, >3 fold ...
Zichen Gong, Ady Suwardi, Jing Cao
wiley +1 more source
Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping. [PDF]
Liu S, Liu L, Pang M.
europepmc +1 more source
A Time-Success Ratio Analysis of wPRF-based Leakage-Resilient Stream Ciphers [PDF]
Weak pseudorandom functions (wPRFs) found an important application as main building blocks for leakage-resilient ciphers (EUROCRYPT'09). Several security bounds, based on different techniques, were given to these stream ciphers. The security loss in these reduction-based proofs is always polynomial, but has not been studied in detail.
arxiv
Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers [PDF]
Muxiang Zhang
openalex +1 more source