Results 251 to 260 of about 28,850 (320)
A novel multiple-image encryption with multi-petals structured light. [PDF]
Tian H, Zhuang X, Yan A, Zhang H.
europepmc +1 more source
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion. [PDF]
Wen H, Lin Y, Kang S, Zhang X, Zou K.
europepmc +1 more source
Fusion cryptography for secure medical data transmission using mathematical quantum computing operations. [PDF]
Aljaedi A +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Fast Correlation Attacks on K2 Stream Cipher
IEEE Transactions on Information Theory, 2023K2 is an LFSR-based dynamic feedback stream cipher and has been standardized by ISO/IEC 18033-4. The fast correlation attack (FCA) is a well-known cryptanalysis tool for LFSR-based stream ciphers.
Sudong Ma, Chenhui Jin, Jie Guan
semanticscholar +1 more source
A proposed Development of Clock Control Stream Cipher based on Suitable Attack
2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA, 2020The feedback shift registers (FSR) is known to allow produce sequences with large period and fast realization. It is well known that building block used for constructing a key-stream generator, consists of a control register CR and a clock-controlled ...
Sattar B. Sadkhan
semanticscholar +1 more source
A Guess-And-Determine Attack On SNOW-V Stream Cipher
Computer/law journal, 2020The 5G mobile communication system is coming with a main objective, known also as IMT-2020, that intends to increase the current data rates up to several gigabits per second.
Lin Jiao, Yongqiang Li, Yonglin Hao
semanticscholar +1 more source

