Results 31 to 40 of about 23,888 (272)

Counter Mode Development for Block Cipher Operations [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +1 more source

The DRACO Stream Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size.
Matthias Hamann   +3 more
doaj   +1 more source

Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph

open access: yesIEEE Access, 2021
Represented by application-specific instruction set processors (ASIPs) and array processors, existing cryptographic processors face challenges in application to mobile terminals with sensitive security requirements.
Yufei Zhu   +6 more
doaj   +1 more source

A novel H.264 SVC encryption scheme for secure bit-rate transcoding [PDF]

open access: yes, 2009
This paper presents a novel architecture for the secure delivery of encrypted H.264 SVC bitstreams. It relies on a block cipher and stream cipher used in a novel way that would allow an intermediary transcoder to truncate the bitstream to the appropriate
Bull, DR, Redmill, DW, Thomas, NM
core   +2 more sources

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: yes, 2009
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo   +3 more
core   +2 more sources

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]

open access: yesJournal of Engineering Science and Technology, 2017
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj  

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +1 more source

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

Home - About - Disclaimer - Privacy