Results 11 to 20 of about 877,768 (275)

Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2022
In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices.
A. T. Maolood   +2 more
semanticscholar   +1 more source

Improvement Majority Function in A5/1 stream cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless communication.
Hala Bahjat, Mohanad Ali
doaj   +1 more source

Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]

open access: yesJisuanji kexue, 2023
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj   +1 more source

A Modification on Key Stream Generator for RC4 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2020
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj   +1 more source

Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]

open access: yesEngineering and Technology Journal, 2011
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj   +1 more source

Experimental demonstration of a 4,294,967,296-QAM-based Y-00 quantum stream cipher template carrying 160-Gb/s 16-QAM signals.

open access: yesOptics Express, 2021
We demonstrate a 4,294,967,296-quadrature amplitude modulation (QAM) based Y-00 quantum stream cipher system carrying a 160-Gb/s 16-QAM signal transmitted over 320-km SSMF.
Xi Chen   +8 more
semanticscholar   +1 more source

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers.
Sandip Karmakar, Dipanwita Roy Chowdhury
doaj   +1 more source

The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator

open access: yesApplied Sciences, 2021
In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of the system is
Fethi Dridi   +4 more
semanticscholar   +1 more source

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +1 more source

Ultra-long-haul digital coherent PSK Y-00 quantum stream cipher transmission system.

open access: yesOptics Express, 2021
A record-long 10,118-km fiber transmission with physical layer encryption is demonstrated utilizing a Y-00 cipher based on signal masking by quantum (shot) noise.
K. Tanizawa, F. Futami
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy