Results 1 to 10 of about 12,127 (23)

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission [PDF]

open access: yes, 2004
We consider the scenario where Alice wants to send a secret (classical) $n$-bit message to Bob using a classical key, and where only one-way transmission from Alice to Bob is possible.
D. DiVincenzo   +5 more
core   +2 more sources

Self-synchronizing stream ciphers and dynamical systems: state of the art and open issues [PDF]

open access: yes, 2010
International audienceDynamical systems play a central role in the design of symmetric cryptosystems. Their use has been widely investigated both in ''chaos-based'' private communications and in stream ciphers over finite fields. In the former case, they
Guillot, Philippe, Millérioux, Gilles
core   +3 more sources

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

Finding low-weight polynomial multiples using discrete logarithm [PDF]

open access: yes, 2007
Finding low-weight multiples of a binary polynomial is a difficult problem arising in the context of stream ciphers cryptanalysis. The classical algorithm to solve this problem is based on a time memory trade-off.
Domaine De Voluceau   +3 more
core   +5 more sources

On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]

open access: yes, 2006
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa   +14 more
core   +3 more sources

Quantum Noise Randomized Ciphers

open access: yes, 2006
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom   +13 more
core   +1 more source

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: yes, 2009
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo   +3 more
core   +2 more sources

A New Type of Cipher: DICING_csb [PDF]

open access: yes, 2007
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core   +2 more sources

The mathematical models of modernstream ciphers [PDF]

open access: yes, 2017
Дана робота присвячена аналізу сучасних потокових шифрів, а також методиці оцінювання поточних шифрів за наступними критеріями: шифрування довгих повідомлень, шифрування коротких повідомлень, ініціалізація / генерація ключових параметрів.This paper ...
Andrushkevych, Alina   +3 more
core  

Home - About - Disclaimer - Privacy