Results 11 to 20 of about 880,434 (384)
Improved Related-Cipher Attack on Salsa20 Stream Cipher
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj +2 more sources
An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol [PDF]
This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or $\alpha\eta$ scheme) against the fast correlation attack, the typical attack on stream ciphers. Although a very simple experimental model of the quantum stream cipher without a random mapper may be decrypted in the information theoretic sense by the ...
Osamu Hirota, Kaoru Kurosawa
arxiv +3 more sources
Stream Cipher Using Genetic Algorithm [PDF]
The research tackles newly suggested method in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key ...
Melad saeed
doaj +2 more sources
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo+3 more
core +4 more sources
A SUGGESTED SUPER SALSA STREAM CIPHER [PDF]
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj +3 more sources
An efficient Grain-80 stream cipher with unrolling features to enhance the throughput on hardware platform [PDF]
The stream cipher is a fundamental component of symmetric cryptography and offers unique implementation speed and scalability advantages. Additionally, the complexity of the cipher algorithm deployment environment forces new, appropriate designs and ...
Malode Vishwanatha Panduranga Rao+1 more
exaly +3 more sources
Towards Low Energy Stream Ciphers
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags.
Subhadeep Banik+7 more
doaj +6 more sources
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption [PDF]
The need for medical image encryption is increasingly pronounced, for example, to safeguard the privacy of the patients’ medical imaging data. In this article, a novel deep learning-based key generation network (DeepKeyGen) is proposed as a stream cipher
Yi Ding+5 more
semanticscholar +1 more source