Results 51 to 60 of about 13,195 (284)

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 1/2n, where n denotes the inner state length of the underlying keystream generator.
Matthias Hamann   +2 more
doaj   +1 more source

Bias in the LEVIATHAN Stream Cipher [PDF]

open access: yes, 2002
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second
Crowley, Paul, Lucks, Stefan
openaire   +2 more sources

Resistance Rapid Heating of Aluminum Coatings in an Extreme High Vacuum–Adequate Atmosphere for Hot Stamping

open access: yesAdvanced Engineering Materials, EarlyView.
The subject of this work is the development of a corrosion‐protective coating on steel sheets for form hardening. Rapid heating in an extreme high vacuum (XHV)‐adequate atmosphere is a useful method to prevent oxidation during alloying of 22MnB5 and aluminum to obtain a metallurgical bonding.
Lorenz Albracht   +5 more
wiley   +1 more source

Review of algebraic attacks on stream ciphers

open access: yesTongxin xuebao, 2006
The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations ...
ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
doaj   +2 more sources

Fast Correlation Attacks on Grain-like Small State Stream Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation attacks, which are commonly regarded as classical cryptanalytic methods against LFSR-based stream ciphers.
Bin Zhang, Xinxin Gong, Willi Meier
doaj   +1 more source

Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things

open access: yesIEEE Access, 2020
With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks,
Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren
doaj   +1 more source

Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions

open access: yes, 2009
Algebraic and fast algebraic attacks are power tools to analyze stream ciphers. A class of symmetric Boolean functions with maximum algebraic immunity were found vulnerable to fast algebraic attacks at EUROCRYPT'06. Recently, the notion of AAR (algebraic
Lin Dongdai, Liu Meicheng, Pei Dingyi
core   +1 more source

Toward Low‐Consumable Anodes: Process Simulation and Prospective Life Cycle Assessment of NiFe2O4‐NiO‐Ni‐Cu vs. Prebaked Anodes for Aluminum Production with use of Molten Salt Electrolysis

open access: yesAdvanced Engineering Materials, EarlyView.
Low‐consumable nickel ferrite‐based anodes for the Hall–Héroult process are compared with conventional prebaked carbon anodes using thermodynamic simulation and prospective life cycle assessment under contrasting future electricity system pathways from 2025 to 2050.
Felipe Alejandro Garcia Paz   +6 more
wiley   +1 more source

Interaction of Ladle Slag With Varying SiO2 Content and Recyclate‐Based MgO–C Refractories

open access: yesAdvanced Engineering Materials, EarlyView.
Ladle slags (CaO/Al2O3 = 1) with 1–20 wt% SiO2 were investigated in contact with industrial MgO–C refractories fabricated from fresh magnesia and 50 wt% recyclate. The sessile drop method at 1600°C reveals intensive gas formation, delayed slag infiltration in recyclate‐based samples, and, under high‐SiO2 slag, formation of a dense MgAl2O4‐rich ...
Anton Yehorov   +6 more
wiley   +1 more source

On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings

open access: yesCondensed Matter Physics, 2008
The paper is devoted to computer implementation of some graph based stream ciphers. We compare the time performance of this new algorithm with fast, but no very secure RC4, and with DES. It turns out that some of new algorithms are faster than RC4.
J.S.Kotorowicz, V.A.Ustimenko
doaj   +1 more source

Home - About - Disclaimer - Privacy