Results 101 to 110 of about 25,616 (323)
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers [PDF]
Philip Hawkes, Gregory G. Rose
openalex +1 more source
The Salsa20 Family of Stream Ciphers [PDF]
Salsa20 is a family of 256-bit stream ciphers designed in 2005 and submitted to eSTREAM, the ECRYPT Stream Cipher Project. Salsa20 has progressed to the third round of eSTREAM without any changes. The 20-round stream cipher Salsa20/20 is consistently faster than AES and is recommended by the designer for typical cryptographic applications.
openaire +2 more sources
A Sustainable Biotechnology Approach for Mineral Separation
Silver‑binding peptides are first identified through phage‐display screening, and then engineered into multifunctional and responsive peptides or proteins. These tailored biomolecules can selectively capture and aggregate silver particles or ions from complex mixtures, enabling rapid and efficient silver separation and recovery.
Guangze Yang +7 more
wiley +1 more source
Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping. [PDF]
Liu S, Liu L, Pang M.
europepmc +1 more source
Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers [PDF]
Muxiang Zhang
openalex +1 more source
Execution Integrity with In-Place Encryption
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data ...
Arias, Orlando +5 more
core
In the last decades the tremendous usage of multimedia data like audio, video and images through communication channels create a need on the security over networks. Since multimedia content utilize large amount of storage for storing images, audio and video, classical cryptographic algorithms such as DES, AES are not efficient in encrypting multimedia ...
P. Vidhya Saraswathi, M. Venkatesulu
openaire +1 more source
Enhancing Security of Vigenere Cipher by Stream Cipher
Cryptography is a science of converting clear message into secret message "nonreadable message", where message was encrypted at sender side then decrypted at receiver side. Vigenere is an example of substitution cipher, it has various limitations, in this paper we propose an advanced encryption algorithm which improves the security of Vigenere method ...
Falah Hassan Sarhan, Fairouz Sher Ali
openaire +2 more sources
A metal halide perovskite‐based photoanode integrated with a CoNiFe layered double hydroxide (LDH) cocatalyst is reported for selective glucose oxidation reaction (GOR), achieving simultaneous and unassisted photoelectrochemical hydrogen production. This system delivers high photocurrent density, excellent Faradaic efficiency of GOR, and strong techno ...
Shujie Zhou +12 more
wiley +1 more source
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers [PDF]
Vladimir V. Chepyzhov +2 more
openalex +1 more source

