Results 61 to 70 of about 28,850 (320)
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher [PDF]
This paper will introduce two proposal algorithms (Snowfish 1) and the (Snowfish 2) to improve the Sosemanuk stream cipher algorithm by benefiting from the efficient properties of the Twofish block cipher and also use its key schedule, keydependent Sbox ...
Shant K. Avakian, Rana S. Mohammed
doaj +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida +16 more
wiley +1 more source
Guess and determine attack on E0algorithm
A guess and determine attack on E0was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was ...
Ying-jie ZHAN, Lin DING, Jie GUAN
doaj +2 more sources
Attack Stream Cipher By Using Cipher System Only
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting
K. M. Hussein
doaj
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures
A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs.
Ayoub Mars, Wael Adi
doaj +1 more source
A New Secure Stream Cipher for Scan Chain Encryption
The accessibility to the internal IP cores of Systems on Chip (SoC) provided by the testing infrastructures is a serious security threat. It has been known for many years that the scan chains can be exploited to retrieve secret keys of crypto-processors.
M. D. Silva +5 more
semanticscholar +1 more source
This work demonstrates the successful integration of a phenanthroline‐based 2D COF with MnI catalytic sites into a catholyte‐free membrane‐electrode‐assembly cell for CO2 electroreduction. The crystalline COF actively suppresses Mn⁰–Mn⁰ dimerization, achieving a turnover frequency of 617 h⁻¹ at 2.8 V (full‐cell potential), and enabling stable operation.
Laura Spies +8 more
wiley +1 more source
New Practical Attacks on GEA-1 Based on a New-Found Weakness
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu +4 more
doaj +1 more source
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) for $\sigma $ -LFSRs. $\sigma $ -LFSRs with such configurations can be applied to any stream cipher that uses a word-based LFSR.
Subrata Nandi +3 more
doaj +1 more source
A metal halide perovskite‐based photoanode integrated with a CoNiFe layered double hydroxide (LDH) cocatalyst is reported for selective glucose oxidation reaction (GOR), achieving simultaneous and unassisted photoelectrochemical hydrogen production. This system delivers high photocurrent density, excellent Faradaic efficiency of GOR, and strong techno ...
Shujie Zhou +12 more
wiley +1 more source

