Results 11 to 20 of about 13,195 (284)

Self-synchronizing stream ciphers and dynamical systems: state of the art and open issues [PDF]

open access: yes, 2010
International audienceDynamical systems play a central role in the design of symmetric cryptosystems. Their use has been widely investigated both in ''chaos-based'' private communications and in stream ciphers over finite fields. In the former case, they
Guillot, Philippe, Millérioux, Gilles
core   +3 more sources

Towards Low Energy Stream Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags.
Subhadeep Banik   +7 more
doaj   +1 more source

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +1 more source

Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices

open access: yesICT Express, 2018
A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a) is a family of stream ciphers designed for low-end devices ...
Subhrajyoti Deb, Bubu Bhuyan
doaj   +1 more source

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

Simulating Auxiliary Inputs, Revisited [PDF]

open access: yes, 2016
For any pair $(X,Z)$ of correlated random variables we can think of $Z$ as a randomized function of $X$. Provided that $Z$ is short, one can make this function computationally efficient by allowing it to be only approximately correct.
A Buldas   +9 more
core   +2 more sources

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers.
Sandip Karmakar, Dipanwita Roy Chowdhury
doaj   +1 more source

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there have
Satyam Kumar   +6 more
doaj   +1 more source

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Cryptanalysis of the stream cipher BEAN [PDF]

open access: yesProceedings of the 4th international conference on Security of information and networks, 2011
BEAN is a recent stream cipher proposal that uses Feedback with Carry Shift Registers (FCSRs) and an output function. There is a sound motivation behind the use of FCSRs in BEAN as they provide several cryptographically interesting properties. In this paper, we show that the output function is not optimal.
Martin Ågren, Martin Hell
openaire   +1 more source

Home - About - Disclaimer - Privacy