Results 41 to 50 of about 1,077 (159)

New Hybrid Efficient Stream Cipher KeyGenerator Based on LFSR's and Chaotic Map

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences
Communication security that depends on chaos can be considered as a new approach which provides protection and security of communications and maintains confidentiality because Chaos theory can be implemented in cryptosystem successfully.
Dina H. Abbaas, Ayad A. AbdulSalam
doaj   +1 more source

Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. [PDF]

open access: yesEntropy (Basel), 2021
Madarro-Capó EJ   +3 more
europepmc   +1 more source

A SUGGESTED SUPER SALSA STREAM CIPHER

open access: yesIraqi Journal for Computers and Informatics, 2018
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj   +1 more source

Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2015
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj  

Stream Ciphers Analysis Methods

open access: yesInternational Journal of Computers Communications & Control, 2010
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a pseudorandom number generator.
Dominic Bucerzan   +3 more
openaire   +2 more sources

New Practical Attacks on GEA-1 Based on a New-Found Weakness

open access: yesIET Information Security
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu   +4 more
doaj   +1 more source

Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. [PDF]

open access: yesSensors (Basel), 2020
Potestad-Ordóñez FE   +4 more
europepmc   +1 more source

Some observations of near collision attacks on grain v1

open access: yesCybersecurity
Near collision attacks and fast near collision attacks on stream ciphers are controversial attack methods in the field of cryptography in recent years, and their attack results are based on reduced experimental observations and derivation of birthday ...
Shaoyu Du, Weiping Gu, Bin Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy