Results 31 to 40 of about 15,368 (325)

A New Method for Format Preserving Encryption in High-Data Rate Communications

open access: yesIEEE Access, 2020
In some encryption systems it is necessary to preserve the format and length of the encrypted data. This kind of encryption is called FPE (Format Preserving Encryption).
Adrian Perez-Resa   +3 more
doaj   +1 more source

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]

open access: yes, 2007
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl   +10 more
core   +3 more sources

A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher

open access: yesApplied Sciences
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity and are widely used in pseudo-random number generators. However, their period is limited, related to the rule and the number of cells.
Peng Du, Youheng Dong, Qi Cui, Hui Li
doaj   +1 more source

Attacks on the RC4 stream cipher [PDF]

open access: yesDesigns, Codes and Cryptography, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
This research aims in the first stage to built a cipher system using hybrid Genetic Algorithm with single layer Neural network to prevent any data attack during the transition process , where the ASCII of the letters are used as inputs to the network and
Radwan Al-Jawadi, Raid Al-Naima
doaj   +1 more source

Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA

open access: yesIEEE Access, 2021
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and more countermeasures in the design to protect it against malicious attacks.
F. E. Potestad-Ordonez   +4 more
doaj   +1 more source

Cryptanalysis of the Vesta-2M stream cipher

open access: yesTongxin xuebao, 2003
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj   +2 more sources

A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform

open access: yesEntropy, 2018
In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data.
Chunlei Fan, Qun Ding
doaj   +1 more source

On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission [PDF]

open access: yes, 2004
We consider the scenario where Alice wants to send a secret (classical) $n$-bit message to Bob using a classical key, and where only one-way transmission from Alice to Bob is possible.
D. DiVincenzo   +5 more
core   +2 more sources

Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video

open access: yesEntropy, 2021
In actual application scenarios of the real-time video confidential communication, encrypted videos must meet three performance indicators: security, real-time, and format compatibility.
Zirui Zhang   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy