Results 61 to 70 of about 47,059 (344)
Grein. A New Non-Linear Cryptoprimitive [PDF]
In this thesis, we will study a new stream cipher, Grein, and a new cryptoprimitive used in this cipher. The second chapter gives a brief introduction to cryptography in general.
Thorsen, Ole Rydland
core
Quantum Noise Randomized Ciphers
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom+13 more
core +1 more source
The chaotic Henon mapping has been proposed as a method of generating a binary sequence, the Henon sequence. Here it is proven that the subsequence 1100 never occurs in the Henon sequence, so the sequence is not a good key-stream. The distribution of other subsequences of length 4 is also illustrated. >
D. Erdmann, Sean Murphy
openaire +2 more sources
Abstract Purpose This study evaluates the technical feasibility of adapting a surface monitoring system, designed for conventional four‐dimensional computed tomography (4DCT), to an intelligent, breathing‐adapted 4DCT and examines its potential to expand the currently limited range of supported surrogate systems.
Niklas Lackner+4 more
wiley +1 more source
A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a) is a family of stream ciphers designed for low-end devices ...
Subhrajyoti Deb, Bubu Bhuyan
doaj
Amygdala Neurodegeneration: A Key Driver of Visual Dysfunction in Parkinson's Disease
ABSTRACT Objective Visual disability in Parkinson's disease (PD) is not fully explained by retinal neurodegeneration. We aimed to delineate the brain substrate of visual dysfunction in PD and its association with retinal thickness. Methods Forty‐two PD patients and 29 controls underwent 3‐Tesla MRI, retinal spectral‐domain optical coherence tomography,
Asier Erramuzpe+15 more
wiley +1 more source
Morpheus: stream cipher for software & hardware applications [PDF]
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core
One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj +1 more source
Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack [PDF]
Welch--Gong (WG) is a hardware-oriented LFSR-based stream cipher. WG-7 is a version of the eStream submission Welch--Gong, used for RFID encryption and authentication purposes. It offers 80-bit cryptographic security. In modern days, almost all ciphers achieve the security by exploiting the nonlinear feedback structure.
arxiv
Bias in the LEVIATHAN Stream Cipher [PDF]
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second
Crowley, Paul, Lucks, Stefan
openaire +3 more sources