We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,771 results
  1. The welch-gong stream cipher - evolutionary path

    This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has been a long journey that lead the WG stream ciphers to...

    N. Zidarič, K. Mandal, ... M. Aagaard in Cryptography and Communications
    Article Open access 05 August 2023
  2. Efficient selective chaotic video stream cipher for SHVC bitstream

    This paper presents a chaotic Arnold map (CAM)-based selective encryption (SE) bitstream cipher for the scalable High-Efficiency Video Coding (SHVC)....

    Osama S. Faragallah, Ahmed I. Sallam, ... Hala S. El-sayed in Multimedia Tools and Applications
    Article 28 February 2023
  3. ORSCA-GPU: one round stream cipher algorithm for GPU implementation

    Data confidentiality is one of the most critical security services. Many encryption algorithms are currently used to provide data confidentiality....

    Ahmed Fanfakh, Hassan Noura, Raphaël Couturier in The Journal of Supercomputing
    Article 16 February 2022
  4. Generic attacks on small-state stream cipher constructions in the multi-user setting

    Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate...

    Jianfu Huang, Ye Luo, ... Ling Song in Cybersecurity
    Article Open access 08 October 2023
  5. Unsafe Mechanisms of Bluetooth, \(E_0\) Stream Cipher Cryptanalysis with Quantum Annealing

    Due to Shor’s and Grover’s algorithms, quantum computing has become one of the fastest-evolving areas in computational science. Nowadays, one of the...
    Mateusz Leśniak, Elżbieta Burek, Michał Wroński in Computational Science – ICCS 2024
    Conference paper 2024
  6. Securing Digital Images using Stream Cipher and MDS Matrix

    This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of...

    Abdul Gaffar, Anand B. Joshi, Dhanesh Kumar in SN Computer Science
    Article 16 September 2021
  7. Implementation and optimization of ChaCha20 stream cipher on sunway taihuLight supercomputer

    Data have always been the most valuable asset of enterprises and research institutions, and their confidentiality, especially the input and output...

    Weilin Cai, Heng Chen, ... **ngjun Zhang in The Journal of Supercomputing
    Article 24 August 2021
  8. Cube attack on stream cipher E0: revisited

    To investigate the process of cube attack in the world of wireless networks, Nikolaos Petrakos modeled E0 encryption function and implemented cube...

    Kakumani K. C. Deepthi, Kunwar Singh, Sai Karthikeya Konduru in International Journal of Information Technology
    Article 09 May 2022
  9. Guess-and-determine attacks on SNOW-Vi stream cipher

    Recently, a faster variant of SNOW-V, called SNOW-Vi, was proposed for fast enough performance not only in cloud settings but also on low grade CPUs,...

    Lin Jiao, Yonglin Hao, Yongqiang Li in Designs, Codes and Cryptography
    Article 23 November 2022
  10. An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution

    Traditional encryption algorithms are not suitable and computationally efficient for encrypting multimedia data due to the large size and high...

    Yousef Alghamdi, Arslan Munir in SN Computer Science
    Article 20 September 2023
  11. Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrap**

    Fully homomorphic encryption suffers from a large expansion in the size of encrypted data, which makes FHE impractical for low-bandwidth networks....
    Adda-Akram Bendoukha, Pierre-Emmanuel Clet, ... Renaud Sirdey in Data and Applications Security and Privacy XXXVII
    Conference paper 2023
  12. FASTA – A Stream Cipher for Fast FHE Evaluation

    In this paper we propose Fasta, a stream cipher design optimised for implementation over popular fully homomorphic encryption schemes. A number of...
    Carlos Cid, John Petter Indrøy, Håvard Raddum in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  13. Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

    The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 11 September 2023
  14. A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher

    In today’s world of digital technology revolution, the need for secure data transmission has become very crucial. Symmetric encryption algorithms...
    Anita John, Jimmy Jose in Cellular Automata
    Conference paper 2022
  15. Shakey: an improved cipher for protection of Iot devices

    This article primarily focuses on improving an existing symmetric key lightweight cipher known as Shadow. The growing importance of internet of...

    Anushka Sivakumar, Asmi Sriwastawa, Raja Muthalagu in International Journal of Information Technology
    Article 10 August 2023
  16. LightWeight energy-efficient Block Cipher based on DNA cryptography to secure data in internet of medical things devices

    The purpose of this study is to secure data in internet of medical things (IoMT) environment while saving energy to improve objects lifetime....

    Nabila Zitouni, Maamar Sedrati, Amel Behaz in International Journal of Information Technology
    Article 19 October 2023
  17. Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher

    Ensuring data security and integrity is crucial for achieving the highest level of protection and performance in modern cyber-physical systems (CPS)....

    Kartik Jhawar, Jugal Gandhi, ... Jai Gopal Pandey in Journal of Real-Time Image Processing
    Article 15 February 2024
  18. Attacks on the simple substitution cipher with the calculation of their reliability

    The historical simple substitution cipher is widely known. In educational literature, the study of ciphers and attacks on them begins with it....

    Article 04 February 2023
  19. An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map

    Researchers have paid increasing attention towards the usage of scrambled image for the image encryption in recent years. 2D and 3D scrambled images...

    Nadeem Iqbal, Ibrar Hussain, ... Shahid Yousaf in Multimedia Tools and Applications
    Article 25 March 2023
  20. Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations

    Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...

    Rim Amdouni, Mohamed Gafsi, ... Abdellatif Mtibaa in Multimedia Tools and Applications
    Article 18 March 2023
Did you find what you were looking for? Share feedback.