Results 61 to 70 of about 47,059 (344)

Grein. A New Non-Linear Cryptoprimitive [PDF]

open access: yes, 2013
In this thesis, we will study a new stream cipher, Grein, and a new cryptoprimitive used in this cipher. The second chapter gives a brief introduction to cryptography in general.
Thorsen, Ole Rydland
core  

Quantum Noise Randomized Ciphers

open access: yes, 2006
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom   +13 more
core   +1 more source

Hénon stream cipher

open access: yesElectronics Letters, 1992
The chaotic Henon mapping has been proposed as a method of generating a binary sequence, the Henon sequence. Here it is proven that the subsequence 1100 never occurs in the Henon sequence, so the sequence is not a good key-stream. The distribution of other subsequences of length 4 is also illustrated. >
D. Erdmann, Sean Murphy
openaire   +2 more sources

Exploring surface‐guided systems for intelligent breathing‐adapted four‐dimensional computed tomography: A comparison to infrared‐based reflective marker systems

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose This study evaluates the technical feasibility of adapting a surface monitoring system, designed for conventional four‐dimensional computed tomography (4DCT), to an intelligent, breathing‐adapted 4DCT and examines its potential to expand the currently limited range of supported surrogate systems.
Niklas Lackner   +4 more
wiley   +1 more source

Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices

open access: yesICT Express, 2018
A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a) is a family of stream ciphers designed for low-end devices ...
Subhrajyoti Deb, Bubu Bhuyan
doaj  

Amygdala Neurodegeneration: A Key Driver of Visual Dysfunction in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Visual disability in Parkinson's disease (PD) is not fully explained by retinal neurodegeneration. We aimed to delineate the brain substrate of visual dysfunction in PD and its association with retinal thickness. Methods Forty‐two PD patients and 29 controls underwent 3‐Tesla MRI, retinal spectral‐domain optical coherence tomography,
Asier Erramuzpe   +15 more
wiley   +1 more source

Morpheus: stream cipher for software & hardware applications [PDF]

open access: yes, 2007
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core  

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj   +1 more source

Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack [PDF]

open access: yesarXiv, 2023
Welch--Gong (WG) is a hardware-oriented LFSR-based stream cipher. WG-7 is a version of the eStream submission Welch--Gong, used for RFID encryption and authentication purposes. It offers 80-bit cryptographic security. In modern days, almost all ciphers achieve the security by exploiting the nonlinear feedback structure.
arxiv  

Bias in the LEVIATHAN Stream Cipher [PDF]

open access: yes, 2002
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second
Crowley, Paul, Lucks, Stefan
openaire   +3 more sources

Home - About - Disclaimer - Privacy