Search
Search Results
-
The welch-gong stream cipher - evolutionary path
This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has been a long journey that lead the WG stream ciphers to...
-
Efficient selective chaotic video stream cipher for SHVC bitstream
This paper presents a chaotic Arnold map (CAM)-based selective encryption (SE) bitstream cipher for the scalable High-Efficiency Video Coding (SHVC)....
-
ORSCA-GPU: one round stream cipher algorithm for GPU implementation
Data confidentiality is one of the most critical security services. Many encryption algorithms are currently used to provide data confidentiality....
-
Generic attacks on small-state stream cipher constructions in the multi-user setting
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate...
-
Unsafe Mechanisms of Bluetooth, \(E_0\) Stream Cipher Cryptanalysis with Quantum Annealing
Due to Shor’s and Grover’s algorithms, quantum computing has become one of the fastest-evolving areas in computational science. Nowadays, one of the... -
Securing Digital Images using Stream Cipher and MDS Matrix
This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of...
-
Implementation and optimization of ChaCha20 stream cipher on sunway taihuLight supercomputer
Data have always been the most valuable asset of enterprises and research institutions, and their confidentiality, especially the input and output...
-
Cube attack on stream cipher E0: revisited
To investigate the process of cube attack in the world of wireless networks, Nikolaos Petrakos modeled E0 encryption function and implemented cube...
-
Guess-and-determine attacks on SNOW-Vi stream cipher
Recently, a faster variant of SNOW-V, called SNOW-Vi, was proposed for fast enough performance not only in cloud settings but also on low grade CPUs,...
-
An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution
Traditional encryption algorithms are not suitable and computationally efficient for encrypting multimedia data due to the large size and high...
-
Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrap**
Fully homomorphic encryption suffers from a large expansion in the size of encrypted data, which makes FHE impractical for low-bandwidth networks.... -
FASTA – A Stream Cipher for Fast FHE Evaluation
In this paper we propose Fasta, a stream cipher design optimised for implementation over popular fully homomorphic encryption schemes. A number of... -
Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...
-
A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher
In today’s world of digital technology revolution, the need for secure data transmission has become very crucial. Symmetric encryption algorithms... -
Shakey: an improved cipher for protection of Iot devices
This article primarily focuses on improving an existing symmetric key lightweight cipher known as Shadow. The growing importance of internet of...
-
LightWeight energy-efficient Block Cipher based on DNA cryptography to secure data in internet of medical things devices
The purpose of this study is to secure data in internet of medical things (IoMT) environment while saving energy to improve objects lifetime....
-
Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher
Ensuring data security and integrity is crucial for achieving the highest level of protection and performance in modern cyber-physical systems (CPS)....
-
Attacks on the simple substitution cipher with the calculation of their reliability
The historical simple substitution cipher is widely known. In educational literature, the study of ciphers and attacks on them begins with it....
-
An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map
Researchers have paid increasing attention towards the usage of scrambled image for the image encryption in recent years. 2D and 3D scrambled images...
-
Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations
Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...