Results 21 to 30 of about 47,059 (344)

Data‐driven performance metrics for neural network learning

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView., 2023
Summary Effectiveness of data‐driven neural learning in terms of both local mimima trapping and convergence rate is addressed. Such issues are investigated in a case study involving the training of one‐hidden‐layer feedforward neural networks with the extended Kalman filter, which reduces the search for the optimal network parameters to a state ...
Angelo Alessandri   +2 more
wiley   +1 more source

Kangaroo A Proposed Stream Cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2010
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma   +1 more
doaj   +1 more source

Atom: A Stream Cipher with Double Key Filter

open access: yesIACR Transactions on Symmetric Cryptology, 2021
It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs to be at least twice the size of the length of its secret key.
Subhadeep Banik   +6 more
doaj   +1 more source

Performance analysis of control allocation using data‐driven integral quadratic constraints

open access: yesAdvanced Control for Applications, Volume 4, Issue 4, December 2022., 2022
Abstract A new method is presented for evaluating the performance of a nonlinear control allocation system within a linear control loop. To that end, a worst‐case gain analysis problem is formulated that can be readily solved by means of well‐established methods from robustness analysis using integral quadratic constraints (IQCs).
Manuel Pusch   +2 more
wiley   +1 more source

Cryptanalysis of the stream cipher BEAN [PDF]

open access: yesProceedings of the 4th international conference on Security of information and networks, 2011
BEAN is a recent stream cipher proposal that uses Feedback with Carry Shift Registers (FCSRs) and an output function. There is a sound motivation behind the use of FCSRs in BEAN as they provide several cryptographically interesting properties. In this paper, we show that the output function is not optimal.
Ågren, Martin, Hell, Martin
openaire   +3 more sources

Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial [PDF]

open access: yesEngineering and Technology Journal, 2015
The increase in the speed of computers and adoption on it as means of encryption (send and receive encrypted data), which led to the development of modern encryption techniques such as (stream cipher and block cipher).
Zainab Mohammed Hussein   +1 more
doaj   +1 more source

Deep Learning based Cryptanalysis of Stream Ciphers [PDF]

open access: yes, 2021
Conventional cryptanalysis techniques necessitate an extensive analysis of non-linear functions defining the relationship of plain data, key, and corresponding cipher data. These functions have very high degree terms and make cryptanalysis work extremely
Gupta, Indivar   +3 more
core   +2 more sources

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj   +1 more source

The DRACO Stream Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size.
Matthias Hamann   +3 more
doaj   +1 more source

Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph

open access: yesIEEE Access, 2021
Represented by application-specific instruction set processors (ASIPs) and array processors, existing cryptographic processors face challenges in application to mobile terminals with sensitive security requirements.
Yufei Zhu   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy