Results 101 to 110 of about 880,434 (384)
SOSEMANUK: a fast software-oriented stream cipher [PDF]
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security.
arxiv
Robust and Efficient Dynamic Stream Cipher Cryptosystem
In this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with ...
Abdullah Ayad Ghazi, F. Ali
semanticscholar +1 more source
The seed pod valves of Australian Banksia attenuata plants are not simply bi‐layers which bend when dry. These experiments and models reveal complex mechanics, which allow seed release only after several steps of seed pod opening. Stiffness gradients prevent delamination of the valves during loading, and a shape‐memory function protects the seeds ...
Friedrich Reppe+7 more
wiley +1 more source
Generalized NLFSR Transformation Algorithms and Cryptanalysis of the Class of Espresso-like Stream Ciphers [PDF]
Lightweight stream ciphers are highly demanded in IoT applications. In order to optimize the hardware performance, a new class of stream cipher has been proposed. The basic idea is to employ a single Galois NLFSR with maximum period to construct the cipher. As a representative design of this kind of stream ciphers, Espresso is based on a 256-bit Galois
arxiv
On the Role of the Inner State Size in Stream Ciphers [PDF]
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded systems, security of the keystream generator is often based on a large inner state rather than an inherently secure design.
Zenner, Erik
core
Wetting of Surface Grafted Hydrophilic‐b‐Hydrophobic Block Copolymer Brushes
The wetting properties of surface grafted diblock copolymer brushes are influenced by the thickness of the hydrophilic bottom block and the hydrophobic top block. The surface adapts in presence of water and the contact angles of the bottom block shine through. Abstract The wetting of diblock copolymer brushes by water is studied.
Benjamin Leibauer+7 more
wiley +1 more source
Cryptanalysis of the Vesta-2M stream cipher
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj +2 more sources
Numerical solvers and cryptanalysis
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category.
Lamberger Mario+2 more
doaj +1 more source
Implementasi Vernam Cipher Untuk Pengamanan File Teks [PDF]
Salah satu proses pengamanan yang dapat diterapkan dalam proses penyimpanan file adalah dengan melakukan proses kriptografi. Proses kriptografi dilakukan dengan melakukan proses pengacakan data, sehingga file yang asli tidak mudah untuk dibaca oleh pihak
Pinem, J. P. (Jeita)
core
Cryptanalysis of the FLIP Family of Stream Ciphers [PDF]
At Eurocrypt 2016, Méaux et al. proposed FLIP, a new family of stream ciphers intended for use in Fully Homomorphic Encryption systems. Unlike its competitors which either have a low initial noise that grows at each successive encryption, or a high constant noise, the FLIP family of ciphers achieves a low constant noise thanks to a new construction ...
Duval, Sébastien+2 more
openaire +3 more sources