Results 51 to 60 of about 13,195 (284)
LIZARD – A Lightweight Stream Cipher for Power-constrained Devices
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 1/2n, where n denotes the inner state length of the underlying keystream generator.
Matthias Hamann +2 more
doaj +1 more source
Bias in the LEVIATHAN Stream Cipher [PDF]
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second
Crowley, Paul, Lucks, Stefan
openaire +2 more sources
The subject of this work is the development of a corrosion‐protective coating on steel sheets for form hardening. Rapid heating in an extreme high vacuum (XHV)‐adequate atmosphere is a useful method to prevent oxidation during alloying of 22MnB5 and aluminum to obtain a metallurgical bonding.
Lorenz Albracht +5 more
wiley +1 more source
Review of algebraic attacks on stream ciphers
The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations ...
ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
doaj +2 more sources
Fast Correlation Attacks on Grain-like Small State Stream Ciphers
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation attacks, which are commonly regarded as classical cryptanalytic methods against LFSR-based stream ciphers.
Bin Zhang, Xinxin Gong, Willi Meier
doaj +1 more source
With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks,
Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren
doaj +1 more source
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
Algebraic and fast algebraic attacks are power tools to analyze stream ciphers. A class of symmetric Boolean functions with maximum algebraic immunity were found vulnerable to fast algebraic attacks at EUROCRYPT'06. Recently, the notion of AAR (algebraic
Lin Dongdai, Liu Meicheng, Pei Dingyi
core +1 more source
Low‐consumable nickel ferrite‐based anodes for the Hall–Héroult process are compared with conventional prebaked carbon anodes using thermodynamic simulation and prospective life cycle assessment under contrasting future electricity system pathways from 2025 to 2050.
Felipe Alejandro Garcia Paz +6 more
wiley +1 more source
Interaction of Ladle Slag With Varying SiO2 Content and Recyclate‐Based MgO–C Refractories
Ladle slags (CaO/Al2O3 = 1) with 1–20 wt% SiO2 were investigated in contact with industrial MgO–C refractories fabricated from fresh magnesia and 50 wt% recyclate. The sessile drop method at 1600°C reveals intensive gas formation, delayed slag infiltration in recyclate‐based samples, and, under high‐SiO2 slag, formation of a dense MgAl2O4‐rich ...
Anton Yehorov +6 more
wiley +1 more source
On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings
The paper is devoted to computer implementation of some graph based stream ciphers. We compare the time performance of this new algorithm with fast, but no very secure RC4, and with DES. It turns out that some of new algorithms are faster than RC4.
J.S.Kotorowicz, V.A.Ustimenko
doaj +1 more source

