Results 41 to 50 of about 1,077 (159)
An Image Compression Encryption Algorithm Based on Chaos and ZUC Stream Cipher. [PDF]
Song X, Shi M, Zhou Y, Wang E.
europepmc +1 more source
New Hybrid Efficient Stream Cipher KeyGenerator Based on LFSR's and Chaotic Map
Communication security that depends on chaos can be considered as a new approach which provides protection and security of communications and maintains confidentiality because Chaos theory can be implemented in cryptosystem successfully.
Dina H. Abbaas, Ayad A. AbdulSalam
doaj +1 more source
Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. [PDF]
Madarro-Capó EJ +3 more
europepmc +1 more source
A SUGGESTED SUPER SALSA STREAM CIPHER
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj +1 more source
Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping. [PDF]
Liu S, Liu L, Pang M.
europepmc +1 more source
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj
Stream Ciphers Analysis Methods
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a pseudorandom number generator.
Dominic Bucerzan +3 more
openaire +2 more sources
New Practical Attacks on GEA-1 Based on a New-Found Weakness
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu +4 more
doaj +1 more source
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. [PDF]
Potestad-Ordóñez FE +4 more
europepmc +1 more source
Some observations of near collision attacks on grain v1
Near collision attacks and fast near collision attacks on stream ciphers are controversial attack methods in the field of cryptography in recent years, and their attack results are based on reduced experimental observations and derivation of birthday ...
Shaoyu Du, Weiping Gu, Bin Zhang
doaj +1 more source

