Results 71 to 80 of about 26,227 (226)
Stream Ciphers Analysis Methods
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a pseudorandom number generator.
Dominic Bucerzan +3 more
openaire +2 more sources
New Practical Attacks on GEA-1 Based on a New-Found Weakness
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu +4 more
doaj +1 more source
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. [PDF]
Potestad-Ordóñez FE +4 more
europepmc +1 more source
Another Tradeoff Attack on Sprout-Like Stream Ciphers [PDF]
Bin Zhang, Xinxin Gong
openalex +1 more source
Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks
Draco is a lightweight small-state stream cipher proposed in 2022. It is designed to provide a 128-bit security level and be provably secure against time-memory-data trade-off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO
Ziyu Guan +4 more
doaj +1 more source
This paper proposes a method for in-memory true random number generation (TRNG) by leveraging the dual functionality of spin-orbit torque based magnetic tunnel junction (SOT-MTJ) while showcasing its efficacy in hardware-efficient Grain stream ciphers ...
Arshid Nisar +6 more
doaj +1 more source
Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network [PDF]
Wei Zhang +4 more
openalex +1 more source
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG
Carla Mascia +2 more
openalex +2 more sources
Low Power Implementation of Trivium Stream Cipher
J. M. Mora‐Gutiérrez +2 more
openalex +2 more sources
Performance and Statistical Analysis of Stream ciphers in GSM Communications
For a stream cipher to be secure, the keystreamgenerated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certainprobability distribution.
Nagendar Yerukala +2 more
doaj

