Results 51 to 60 of about 26,227 (226)

COZMO - A New Lightweight Stream Cipher [PDF]

open access: yes2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), 2017
This paper deals with the merger of the two lightweight stream ciphers – A5/1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher (output) will act as the input of the A5/1 cipher.
Bonnerji, Rhea   +3 more
openaire   +2 more sources

Speech Encryption using Fixed Point Chaos based Stream Cipher (FPC-SC) [PDF]

open access: yesEngineering and Technology Journal, 2016
Fixed point chaos based stream cipher (FPC-SC) is presented in this paper to encrypt the speech signal. Fixed point chaos based pseudo random bit generator (FPC-PRBG) is used as key sequence in stream cipher system. Two chaotic Lorenz and Chen systemsare
Fadhil S. Hasan
doaj   +1 more source

Stream cipher based on quasigroup string transformations in $Z_p^*$

open access: yes, 2004
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core   +1 more source

Hénon stream cipher

open access: yesElectronics Letters, 1992
The chaotic Henon mapping has been proposed as a method of generating a binary sequence, the Henon sequence. Here it is proven that the subsequence 1100 never occurs in the Henon sequence, so the sequence is not a good key-stream. The distribution of other subsequences of length 4 is also illustrated. >
D. Erdmann, S. Murphy
openaire   +1 more source

On the Role of the Inner State Size in Stream Ciphers [PDF]

open access: yes, 2004
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded systems, security of the keystream generator is often based on a large inner state rather than an inherently secure design.
Zenner, Erik
core  

Numerical solvers and cryptanalysis

open access: yesJournal of Mathematical Cryptology, 2009
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category.
Lamberger Mario   +2 more
doaj   +1 more source

Cryptanalysis of the Vesta-2M stream cipher

open access: yesTongxin xuebao, 2003
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj   +2 more sources

Design a Lightweight Authentication Encryption Based on Stream Cipher and Chaotic Maps with Sponge Structure for Internet of Things Applications

open access: bronze, 2022
Rana Saad Mohammed   +99 more
openalex   +1 more source

Attack Stream Cipher By Using Cipher System Only

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  
K. M. Hussein
doaj  

Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher

open access: yesIEEE Access
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj   +1 more source

Home - About - Disclaimer - Privacy