Results 101 to 110 of about 880,434 (384)

SOSEMANUK: a fast software-oriented stream cipher [PDF]

open access: yesNew Stream Cipher Designs - The eSTREAM finalists (2008) 98-118, 2008
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security.
arxiv  

Robust and Efficient Dynamic Stream Cipher Cryptosystem

open access: yesIraqi Journal of Science, 2018
In this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with ...
Abdullah Ayad Ghazi, F. Ali
semanticscholar   +1 more source

Material Composition Gradient Controls the Autonomous Opening of Banksia Seed Pods in Fire‐Prone Habitats

open access: yesAdvanced Functional Materials, EarlyView.
The seed pod valves of Australian Banksia attenuata plants are not simply bi‐layers which bend when dry. These experiments and models reveal complex mechanics, which allow seed release only after several steps of seed pod opening. Stiffness gradients prevent delamination of the valves during loading, and a shape‐memory function protects the seeds ...
Friedrich Reppe   +7 more
wiley   +1 more source

Generalized NLFSR Transformation Algorithms and Cryptanalysis of the Class of Espresso-like Stream Ciphers [PDF]

open access: yesarXiv, 2019
Lightweight stream ciphers are highly demanded in IoT applications. In order to optimize the hardware performance, a new class of stream cipher has been proposed. The basic idea is to employ a single Galois NLFSR with maximum period to construct the cipher. As a representative design of this kind of stream ciphers, Espresso is based on a 256-bit Galois
arxiv  

On the Role of the Inner State Size in Stream Ciphers [PDF]

open access: yes, 2004
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded systems, security of the keystream generator is often based on a large inner state rather than an inherently secure design.
Zenner, Erik
core  

Wetting of Surface Grafted Hydrophilic‐b‐Hydrophobic Block Copolymer Brushes

open access: yesAdvanced Functional Materials, EarlyView.
The wetting properties of surface grafted diblock copolymer brushes are influenced by the thickness of the hydrophilic bottom block and the hydrophobic top block. The surface adapts in presence of water and the contact angles of the bottom block shine through. Abstract The wetting of diblock copolymer brushes by water is studied.
Benjamin Leibauer   +7 more
wiley   +1 more source

Cryptanalysis of the Vesta-2M stream cipher

open access: yesTongxin xuebao, 2003
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj   +2 more sources

Numerical solvers and cryptanalysis

open access: yesJournal of Mathematical Cryptology, 2009
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category.
Lamberger Mario   +2 more
doaj   +1 more source

Implementasi Vernam Cipher Untuk Pengamanan File Teks [PDF]

open access: yes, 2018
Salah satu proses pengamanan yang dapat diterapkan dalam proses penyimpanan file adalah dengan melakukan proses kriptografi. Proses kriptografi dilakukan dengan melakukan proses pengacakan data, sehingga file yang asli tidak mudah untuk dibaca oleh pihak
Pinem, J. P. (Jeita)
core  

Cryptanalysis of the FLIP Family of Stream Ciphers [PDF]

open access: yes, 2016
At Eurocrypt 2016, Méaux et al. proposed FLIP, a new family of stream ciphers intended for use in Fully Homomorphic Encryption systems. Unlike its competitors which either have a low initial noise that grows at each successive encryption, or a high constant noise, the FLIP family of ciphers achieves a low constant noise thanks to a new construction ...
Duval, Sébastien   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy