Results 61 to 70 of about 26,227 (226)

Execution Integrity with In-Place Encryption

open access: yes, 2017
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data ...
Arias, Orlando   +5 more
core  

New Hybrid Efficient Stream Cipher KeyGenerator Based on LFSR's and Chaotic Map

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences
Communication security that depends on chaos can be considered as a new approach which provides protection and security of communications and maintains confidentiality because Chaos theory can be implemented in cryptosystem successfully.
Dina H. Abbaas, Ayad A. AbdulSalam
doaj   +1 more source

A SUGGESTED SUPER SALSA STREAM CIPHER

open access: yesIraqi Journal for Computers and Informatics, 2018
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream
Mohammed Mahdi, Nidaa Hassan
doaj   +1 more source

Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. [PDF]

open access: yesEntropy (Basel), 2021
Madarro-Capó EJ   +3 more
europepmc   +1 more source

Quantum noise stream cipher based on optical digital to analog conversion [PDF]

open access: gold, 2022
Zhaoyun Li   +6 more
openalex   +1 more source

Slid Pairs of the Fruit-80 Stream Cipher

open access: bronze, 2022
Kok‐An Pang   +2 more
openalex   +2 more sources

Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2015
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj  

Home - About - Disclaimer - Privacy