Results 61 to 70 of about 15,368 (325)
Guess and determine attack on E0algorithm
A guess and determine attack on E0was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was ...
Ying-jie ZHAN, Lin DING, Jie GUAN
doaj +2 more sources
An Improved Algorithm of Key Stream Extraction with Slide Attack Resistant [PDF]
In order to enhance the ability of the stream cipher algorithm for Leak Extraction(LEX) in resisting slide attack,16 bytes from the intermediate variable are extracted at each key expansion of Advanced Encryption Standard(AES),and they are used as the ...
DING Jie,SHI Hui,GONG Jing,DENG Yuanqing
doaj
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher [PDF]
This paper will introduce two proposal algorithms (Snowfish 1) and the (Snowfish 2) to improve the Sosemanuk stream cipher algorithm by benefiting from the efficient properties of the Twofish block cipher and also use its key schedule, keydependent Sbox ...
Shant K. Avakian, Rana S. Mohammed
doaj +1 more source
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo +3 more
core +2 more sources
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva +9 more
wiley +1 more source
New Practical Attacks on GEA-1 Based on a New-Found Weakness
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu +4 more
doaj +1 more source
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures
A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs.
Ayoub Mars, Wael Adi
doaj +1 more source
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) for $\sigma $ -LFSRs. $\sigma $ -LFSRs with such configurations can be applied to any stream cipher that uses a word-based LFSR.
Subrata Nandi +3 more
doaj +1 more source

