Results 21 to 30 of about 877,768 (275)

Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems

open access: yesمجلة بغداد للعلوم, 2020
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj   +1 more source

Kangaroo A Proposed Stream Cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2010
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma   +1 more
doaj   +1 more source

Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial [PDF]

open access: yesEngineering and Technology Journal, 2015
The increase in the speed of computers and adoption on it as means of encryption (send and receive encrypted data), which led to the development of modern encryption techniques such as (stream cipher and block cipher).
Zainab Mohammed Hussein   +1 more
doaj   +1 more source

Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT

open access: yesIEEE Internet of Things Journal, 2020
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is very important. In this article, cryptography-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic ...
Tianen Liu   +5 more
semanticscholar   +1 more source

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj   +1 more source

Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices

open access: yesICT Express, 2018
A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a) is a family of stream ciphers designed for low-end devices ...
Subhrajyoti Deb, Bubu Bhuyan
doaj   +1 more source

Counter Mode Development for Block Cipher Operations [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +1 more source

Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph

open access: yesIEEE Access, 2021
Represented by application-specific instruction set processors (ASIPs) and array processors, existing cryptographic processors face challenges in application to mobile terminals with sensitive security requirements.
Yufei Zhu   +6 more
doaj   +1 more source

Y-00 Quantum-Noise Randomized Stream Cipher Using Intensity Modulation Signals for Physical Layer Security of Optical Communications

open access: yesJournal of Lightwave Technology, 2020
The Internet plays an essential role in modern societies and in the amount of sensitive data transported over the optical networks that shows its' importance has increased drastically.
F. Futami, K. Tanizawa, Kentaro Kato
semanticscholar   +1 more source

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy