Results 21 to 30 of about 25,616 (323)
Cryptanalysis of the stream cipher BEAN [PDF]
BEAN is a recent stream cipher proposal that uses Feedback with Carry Shift Registers (FCSRs) and an output function. There is a sound motivation behind the use of FCSRs in BEAN as they provide several cryptographically interesting properties. In this paper, we show that the output function is not optimal.
Ågren, Martin, Hell, Martin
openaire +3 more sources
Kangaroo A Proposed Stream Cipher Algorithm [PDF]
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma +1 more
doaj +1 more source
Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial [PDF]
The increase in the speed of computers and adoption on it as means of encryption (send and receive encrypted data), which led to the development of modern encryption techniques such as (stream cipher and block cipher).
Zainab Mohammed Hussein +1 more
doaj +1 more source
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch ...
Xinxin Fan +2 more
doaj +1 more source
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj +1 more source
A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a) is a family of stream ciphers designed for low-end devices ...
Subhrajyoti Deb, Bubu Bhuyan
doaj +1 more source
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size.
Matthias Hamann +3 more
doaj +1 more source
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim +1 more
core +1 more source
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +1 more source
Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph
Represented by application-specific instruction set processors (ASIPs) and array processors, existing cryptographic processors face challenges in application to mobile terminals with sensitive security requirements.
Yufei Zhu +6 more
doaj +1 more source

