Results 321 to 330 of about 883,280 (384)
Some of the next articles are maybe not open access.

The Stream Cipher Edon80

2008
Edon80 is a hardware binary additive synchronous stream cipher. It's properties are: 1.) The internal structure is highly pipelined; 2.) It is highly parallelizable, making it scalable from the speed of processing point of view; 3.) Its design principles offer possibilities to achieve significant speed asymmetry -- it belongs to a family of stream ...
Danilo Gligoroski   +2 more
openaire   +2 more sources

The rakaposhi Stream Cipher [PDF]

open access: possible, 2009
In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources.
Jun Kurihara   +2 more
openaire   +1 more source

The FBG Stream Cipher

2007 National Radio Science Conference, 2007
In this paper we propose a new synchronous stream cipher; the FBG stream cipher. This cipher is based on FBG (fuzzy bit generator) PN bit generator. The FBG cipher has been designed to produce keystream with guaranteed randomness properties; i.e. passing all the 16 tests of the NIST statistical test suite.
A.H. Ali, Mona Lotfy, Said E. El-Khamy
openaire   +2 more sources

Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme

International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2018
In this paper, the security performance for an 8D self-synchronous and feedback-based chaotic stream cipher with the low 8 bits of state variables for encryption is analyzed.
Zhuosheng Lin   +3 more
semanticscholar   +1 more source

The MICKEY Stream Ciphers

2008
The family of stream ciphers MICKEY (which stands for Mutual Irregular Clocking KEYstream generator) is aimed at resource-constrained hardware platforms. It is intended to have low complexity in hardware, while providing a high level of security.
Matthew Dodd, Steve Babbage
openaire   +2 more sources

Spectrum Analysis of the Stream Cipher

Applied Mechanics and Materials, 2012
Classical cryptography theory holds that the true random sequence is better than any pseudorandom sequence on the security of stream cipher. So people prefer the pseudorandom sequence with long-period to the pseudorandom sequence with short-period. In this paper, it is proved through power spectrum analysis that the pseudorandom sequence with long ...
Lei Zhang, Xin Li, Dai Mao Lin
openaire   +3 more sources

A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher

2018 International Conference on Advanced Science and Engineering (ICOASE), 2018
In this paper, We propose DNA sticker model based algorithm, a computability model, which is a simulation of the parallel computations using the Molecular computing as in Adelman’s DNA computing experiment, it demonstrates how to use a sticker-based ...
Sattar B. Sadkhan, B. S. Yaseen
semanticscholar   +1 more source

Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher

International Conference on the Theory and Application of Cryptology and Information Security, 2022
Orel Cosseron   +4 more
semanticscholar   +1 more source

FASTA - A Stream Cipher for Fast FHE Evaluation

The Cryptographer's Track at RSA Conference, 2022
C. Cid, John Petter Indrøy, H. Raddum
semanticscholar   +1 more source

The Rabbit Stream Cipher

2008
The stream cipher Rabbit was first presented at FSE 2003 [3], and no attacks against it have been published until now. With a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor, Rabbit does also provide very high performance.
Erik Zenner   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy