Results 41 to 50 of about 47,059 (344)

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there have
Satyam Kumar   +6 more
doaj   +1 more source

Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection [PDF]

open access: yes, 2020
Encryption key use is a critical component to the security of a stream cipher: because many implementations simply consist of a key scheduling algorithm and logical exclusive or (XOR), an attacker can completely break the cipher by XORing two ciphertexts
Son, Junggab, Stone, William T.
core   +1 more source

Hybrid Cipher System using Neural Network [PDF]

open access: yes, 2008
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to ...
Hasan, Mokhtar Mohammed   +1 more
core   +2 more sources

A 1 Gbps Chaos-Based Stream Cipher Implemented in 0.18 m CMOS Technology [PDF]

open access: yes, 2019
In this work, a novel chaos-based stream cipher based on a skew tent map is proposed and implemented in a 0.18 µm CMOS (Complementary Metal-Oxide-Semiconductor) technology.
Aldea, C.   +5 more
core   +1 more source

A SUGGESTED SUPER SALSA STREAM CIPHER [PDF]

open access: yesIraqi Journal for Computers and Informatics, 2018
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj   +2 more sources

A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher

open access: yesApplied Sciences
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity and are widely used in pseudo-random number generators. However, their period is limited, related to the rule and the number of cells.
Peng Du, Youheng Dong, Qi Cui, Hui Li
doaj   +1 more source

Improved Related-Cipher Attack on Salsa20 Stream Cipher

open access: yesIEEE Access, 2019
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj   +1 more source

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

A New Type of Cipher: DICING_csb [PDF]

open access: yes, 2007
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core   +2 more sources

Home - About - Disclaimer - Privacy