Results 21 to 30 of about 13,195 (284)

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj   +1 more source

On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]

open access: yes, 2006
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa   +14 more
core   +3 more sources

On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission [PDF]

open access: yes, 2004
We consider the scenario where Alice wants to send a secret (classical) $n$-bit message to Bob using a classical key, and where only one-way transmission from Alice to Bob is possible.
D. DiVincenzo   +5 more
core   +2 more sources

BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]

open access: yesJournal of Engineering Science and Technology, 2017
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj  

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

Randomness of encryption keys generated by super H-antimagic total labeling

open access: yesIndonesian Journal of Combinatorics, 2020
SuperH-antimagic total labeling (SHATL) can be utilized to generate encryption keys. The keys are then used to establish the improved block and stream ciphers.
Antonius Cahya Prihandoko   +3 more
doaj   +1 more source

Finding low-weight polynomial multiples using discrete logarithm [PDF]

open access: yes, 2007
Finding low-weight multiples of a binary polynomial is a difficult problem arising in the context of stream ciphers cryptanalysis. The classical algorithm to solve this problem is based on a time memory trade-off.
Domaine De Voluceau   +3 more
core   +5 more sources

Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph

open access: yesIEEE Access, 2021
Represented by application-specific instruction set processors (ASIPs) and array processors, existing cryptographic processors face challenges in application to mobile terminals with sensitive security requirements.
Yufei Zhu   +6 more
doaj   +1 more source

Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2020
In this work we discuss results obtained from an application of the Hadamard transform to cryptanalysis, andin particular, we determine the probability to decipher different pseudo-random number generators used ascomponents of stream ciphers.
Guillermo Sosa-Gómez   +2 more
doaj   +1 more source

Tabu Search Against Permutation Based Stream Ciphers [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and
Iwona Polak, Marcin Boryczka
doaj   +1 more source

Home - About - Disclaimer - Privacy