Results 61 to 70 of about 15,702 (332)

Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, they are shown to be powerful against Trivium-like ciphers.
Chen-Dong Ye, Tian Tian
doaj   +1 more source

COZMO - A New Lightweight Stream Cipher [PDF]

open access: yes2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), 2017
This paper deals with the merger of the two lightweight stream ciphers – A5/1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher (output) will act as the input of the A5/1 cipher.
Bonnerji, Rhea   +3 more
openaire   +2 more sources

Comment on "Exposed-Key Weakness of Alpha-Eta" [Phys. Lett. A 370 (2007) 131]

open access: yes, 2008
We show that the insecurity claim of the AlphaEta cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 under heterodyne attack is based on invalid extrapolations of Shannon's random cipher analysis and on an invalid statistical
Ahn   +12 more
core   +1 more source

Fractional Skyrmion Tubes in Chiral‐Interfaced 3D Magnetic Nanowires

open access: yesAdvanced Functional Materials, EarlyView.
In chiral 3D helical magnetic nanowires, the coupling between the geometric and magnetic chirality provides a way to create topological spin states like vortex tubes. Here, it is demonstrated how the breaking of this coupling in interfaced 3D nanowires of opposite chirality leads to even more complex topological spin states, such as fractional ...
John Fullerton   +11 more
wiley   +1 more source

Enhancement of Stream Cipher by Using Variant Register in Length

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed.
N. A. Taha
doaj  

Copper‐based Materials for Photo and Electrocatalytic Process: Advancing Renewable Energy and Environmental Applications

open access: yesAdvanced Functional Materials, EarlyView.
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida   +16 more
wiley   +1 more source

The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks

open access: yesEntropy, 2015
Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing.
Jun Choi   +3 more
doaj   +1 more source

Systematization of a 256-bit lightweight block cipher Marvin [PDF]

open access: yes, 2018
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as ...
Bhattacharya, Abhishek   +2 more
core   +1 more source

MnI‐Functionalized Covalent Organic Framework as Efficient Electrocatalyst for CO2 Reduction in a Catholyte‐Free Zero‐Gap Electrolyzer

open access: yesAdvanced Functional Materials, EarlyView.
This work demonstrates the successful integration of a phenanthroline‐based 2D COF with MnI catalytic sites into a catholyte‐free membrane‐electrode‐assembly cell for CO2 electroreduction. The crystalline COF actively suppresses Mn⁰–Mn⁰ dimerization, achieving a turnover frequency of 617 h⁻¹ at 2.8 V (full‐cell potential), and enabling stable operation.
Laura Spies   +8 more
wiley   +1 more source

Performance and Statistical Analysis of Stream ciphers in GSM Communications

open access: yesJournal of Communications Software and Systems, 2020
For a stream cipher to be secure, the keystreamgenerated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certainprobability distribution.
Nagendar Yerukala   +2 more
doaj  

Home - About - Disclaimer - Privacy