Results 71 to 80 of about 26,227 (226)

Stream Ciphers Analysis Methods

open access: yesInternational Journal of Computers Communications & Control, 2010
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a pseudorandom number generator.
Dominic Bucerzan   +3 more
openaire   +2 more sources

New Practical Attacks on GEA-1 Based on a New-Found Weakness

open access: yesIET Information Security
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu   +4 more
doaj   +1 more source

Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. [PDF]

open access: yesSensors (Basel), 2020
Potestad-Ordóñez FE   +4 more
europepmc   +1 more source

Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks

open access: yesIET Information Security
Draco is a lightweight small-state stream cipher proposed in 2022. It is designed to provide a 128-bit security level and be provably secure against time-memory-data trade-off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO
Ziyu Guan   +4 more
doaj   +1 more source

SOT-MTJ-Based Non-Volatile Flip-Flop With In-Memory Randomness for Application in Grain Stream Ciphers

open access: yesIEEE Access
This paper proposes a method for in-memory true random number generation (TRNG) by leveraging the dual functionality of spin-orbit torque based magnetic tunnel junction (SOT-MTJ) while showcasing its efficacy in hardware-efficient Grain stream ciphers ...
Arshid Nisar   +6 more
doaj   +1 more source

Low Power Implementation of Trivium Stream Cipher

open access: green, 2013
J. M. Mora‐Gutiérrez   +2 more
openalex   +2 more sources

Performance and Statistical Analysis of Stream ciphers in GSM Communications

open access: yesJournal of Communications Software and Systems, 2020
For a stream cipher to be secure, the keystreamgenerated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certainprobability distribution.
Nagendar Yerukala   +2 more
doaj  

Home - About - Disclaimer - Privacy