Results 31 to 40 of about 15,368 (325)
A New Method for Format Preserving Encryption in High-Data Rate Communications
In some encryption systems it is necessary to preserve the format and length of the encrypted data. This kind of encryption is called FPE (Format Preserving Encryption).
Adrian Perez-Resa +3 more
doaj +1 more source
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl +10 more
core +3 more sources
A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity and are widely used in pseudo-random number generators. However, their period is limited, related to the rule and the number of cells.
Peng Du, Youheng Dong, Qi Cui, Hui Li
doaj +1 more source
Attacks on the RC4 stream cipher [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts [PDF]
This research aims in the first stage to built a cipher system using hybrid Genetic Algorithm with single layer Neural network to prevent any data attack during the transition process , where the ASCII of the letters are used as inputs to the network and
Radwan Al-Jawadi, Raid Al-Naima
doaj +1 more source
Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and more countermeasures in the design to protect it against malicious attacks.
F. E. Potestad-Ordonez +4 more
doaj +1 more source
Cryptanalysis of the Vesta-2M stream cipher
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj +2 more sources
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj +1 more source
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission [PDF]
We consider the scenario where Alice wants to send a secret (classical) $n$-bit message to Bob using a classical key, and where only one-way transmission from Alice to Bob is possible.
D. DiVincenzo +5 more
core +2 more sources
In actual application scenarios of the real-time video confidential communication, encrypted videos must meet three performance indicators: security, real-time, and format compatibility.
Zirui Zhang +7 more
doaj +1 more source

