Results 41 to 50 of about 877,768 (275)

Cryptanalysis of Achterbahn [PDF]

open access: yes, 2006
. We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM competition. We can break the reduced and the full version with complexity of 2 55 and 2 61 steps.
Frédéric Muller   +2 more
core   +2 more sources

Stream Cipher Using Genetic Algorithm [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
The research tackles newly suggested method  in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key ...
Melad saeed
doaj   +1 more source

Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour

open access: yesApplied Sciences, 2023
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present an alternative stream cipher (Strike) inspired by the stochastic behaviour of ...
Khaled Suwais, Sally Almanasra
doaj   +1 more source

Quantum Noise Randomized Ciphers

open access: yes, 2006
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom   +13 more
core   +1 more source

On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission [PDF]

open access: yes, 2004
We consider the scenario where Alice wants to send a secret (classical) $n$-bit message to Bob using a classical key, and where only one-way transmission from Alice to Bob is possible.
D. DiVincenzo   +5 more
core   +2 more sources

A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher

open access: yesApplied Sciences
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity and are widely used in pseudo-random number generators. However, their period is limited, related to the rule and the number of cells.
Peng Du, Youheng Dong, Qi Cui, Hui Li
doaj   +1 more source

A New Type of Cipher: DICING_csb [PDF]

open access: yes, 2007
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core   +2 more sources

A Practical Attack on the MIFARE Classic [PDF]

open access: yes, 2008
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer.
Gans, Gerhard de Koning   +2 more
core   +3 more sources

Linked dimers of the AAA+ ATPase Msp1 reveal energetic demands and mechanistic plasticity for substrate extraction from lipid bilayers

open access: yesFEBS Letters, EarlyView.
Cells must clear mislocalized or faulty proteins from membranes to survive. The AAA+ ATPase Msp1 performs this task, but dissecting how its six subunits work together is challenging. We engineered linked dimers with varied numbers of functional subunits to reveal how Msp1 subunits cooperate and use energy to extract proteins from the lipid bilayer ...
Deepika Gaur   +5 more
wiley   +1 more source

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]

open access: yes, 2007
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl   +10 more
core   +3 more sources

Home - About - Disclaimer - Privacy