Results 21 to 30 of about 15,702 (332)
On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa +14 more
core +3 more sources
BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj
Finding low-weight polynomial multiples using discrete logarithm [PDF]
Finding low-weight multiples of a binary polynomial is a difficult problem arising in the context of stream ciphers cryptanalysis. The classical algorithm to solve this problem is based on a time memory trade-off.
Domaine De Voluceau +3 more
core +5 more sources
Randomness of encryption keys generated by super H-antimagic total labeling
SuperH-antimagic total labeling (SHATL) can be utilized to generate encryption keys. The keys are then used to establish the improved block and stream ciphers.
Antonius Cahya Prihandoko +3 more
doaj +1 more source
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov +14 more
core +3 more sources
Tabu Search Against Permutation Based Stream Ciphers [PDF]
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and
Iwona Polak, Marcin Boryczka
doaj +1 more source
Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph
Represented by application-specific instruction set processors (ASIPs) and array processors, existing cryptographic processors face challenges in application to mobile terminals with sensitive security requirements.
Yufei Zhu +6 more
doaj +1 more source
Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers [PDF]
In this work we discuss results obtained from an application of the Hadamard transform to cryptanalysis, andin particular, we determine the probability to decipher different pseudo-random number generators used ascomponents of stream ciphers.
Guillermo Sosa-Gómez +2 more
doaj +1 more source
Automatic Search of Cubes for Attacking Stream Ciphers
Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stream ciphers. As the problem that how to recover the superpolys accurately was resolved by Hao et al. in EUROCRYPT 2020, another important problem is how to
Yao Sun
doaj +1 more source
Generalized joint linear complexity of linear recurring multisequences [PDF]
The joint linear complexity of multisequences is an important security measure for vectorized stream cipher systems. Extensive research has been carried out on the joint linear complexity of $N$-periodic multisequences using tools from Discrete ...
Meidl, Wilfried +2 more
core +1 more source

