Results 241 to 250 of about 13,195 (284)
Some of the next articles are maybe not open access.
2009
In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources.
Carlos Cid +2 more
openaire +1 more source
In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources.
Carlos Cid +2 more
openaire +1 more source
2009
Stream ciphers are essential tools for encrypting sensitive data. While having the limitation that a single key may never be used twice, they are often very fast and can offer a valuable alternative to block ciphers in many applications. In this contribution we describe a novel stream cipher based on discrete Kolmogorov systems.
openaire +1 more source
Stream ciphers are essential tools for encrypting sensitive data. While having the limitation that a single key may never be used twice, they are often very fast and can offer a valuable alternative to block ciphers in many applications. In this contribution we describe a novel stream cipher based on discrete Kolmogorov systems.
openaire +1 more source
2012
Synchronous stream ciphers are commonly used in applications with high throughput requirements or on hardware devices with restricted resources. Well known stream ciphers are A5/1, used in GSM, RC4, used in SSL, or E0 as specified in Bluetooth, but also some block cipher modes of operation.
openaire +1 more source
Synchronous stream ciphers are commonly used in applications with high throughput requirements or on hardware devices with restricted resources. Well known stream ciphers are A5/1, used in GSM, RC4, used in SSL, or E0 as specified in Bluetooth, but also some block cipher modes of operation.
openaire +1 more source
Cryptanalysis of Loiss Stream Cipher
The Computer Journal, 2012Loiss is a new byte-oriented stream cipher designed in 2010. It takes a 128-bit initial key and a 128-bit initial vector (IV) as inputs, and provides 128-bit-level security claimed by the designers. In this paper, we find a differential characteristic with significant probability over the full initialization of Loiss.
Lin Ding 0001, Jie Guan
openaire +1 more source
An effective RC4 stream cipher
2013 IEEE 8th International Conference on Industrial and Information Systems, 2013RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can be seen in open literature. Most of them enhance the secrecy of the cipher and the security levels have been analyzed theoretically by using mathematics. In this paper, a new effective RC4 cipher is proposed and the security analysis has been done using Shannon's
openaire +2 more sources
18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004., 2004
We propose a new stream cipher suitable for high-speed network applications, called HSSC (high-speed stream cipher). HSSC uses simple structure to allow detailed analysis and high software performance. The software implementation using C is about 2.07 cycles per byte on a Pentium II 450MHz platform. HSSC uses twelve 32-bit variables as internal states,
openaire +1 more source
We propose a new stream cipher suitable for high-speed network applications, called HSSC (high-speed stream cipher). HSSC uses simple structure to allow detailed analysis and high software performance. The software implementation using C is about 2.07 cycles per byte on a Pentium II 450MHz platform. HSSC uses twelve 32-bit variables as internal states,
openaire +1 more source
Cryptanalysis of Stream Cipher Alpha1
2002Komninos, Honary and Darnell recently proposed stream cipher Alpha1. Alpha1 is basedon A5/1 and is claimed to be much safer than A5/1. However Alpha1 is insecure: a 29-bit feedback shift register could be recovered with about 3000 known plaintext bits with O(229) operations.
openaire +1 more source
Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers
Fractal and Fractional, 2023DRIDI Fethi +2 more
exaly

