Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Keystream.

Artykuły w czasopismach na temat „Keystream”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Keystream”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.

Pełny tekst źródła
Streszczenie:
The traditional basis for constructing modern stream ciphers is keystream generators, which are based on linear shift registers and nonlinear complexity elements. One of the well-known methods for increasing the resistance of such generators, in particular, against algebraic and correlation attacks, is using irregularity into register’s motion process. The most popular keystream generators with irregular motion, used in stream ciphers are A5/1, Alpha1, LILI-128 and others, were thoroughly studied in the 1990s and 2000s. However, specialists’ interest remains relevant, it’s evidenced by recent
Style APA, Harvard, Vancouver, ISO itp.
2

Fu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.

Pełny tekst źródła
Streszczenie:
This paper suggests a new chaos-based color image cipher with an efficient substitution keystream generation strategy. The hyperchaotic Lü system and logistic map are employed to generate the permutation and substitution keystream sequences for image data scrambling and mixing. In the permutation stage, the positions of colored subpixels in the input image are scrambled using a pixel-swapping mechanism, which avoids two main problems encountered when using the discretized version of area-preserving chaotic maps. In the substitution stage, we introduce an efficient keystream generation method t
Style APA, Harvard, Vancouver, ISO itp.
3

Shyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.

Pełny tekst źródła
Streszczenie:
<p>Recently, there have been some studies on security applications using cellular automata. A cellular automaton (CA) is characterized by simplicity and high-speed computation, making it suitable for the resource-constrained IoT environment. In this paper, we first merge a sliding-window, bit permutation, and a CA and propose a keystream generator that has the inherent CA advantages of simplicity and speed. The sliding-window provides the unpredictability of the keystream and gains strength in terms of security. The produced keystream has passed the tests of NIST SP800-22. On the basis o
Style APA, Harvard, Vancouver, ISO itp.
4

Yerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.

Pełny tekst źródła
Streszczenie:
For a stream cipher to be secure, the keystream generated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certain probability distribution. In this paper, we perform a detailed statistical analysis of various stream ciphers used in GSM 2G,3G, 4G and 5G communications. The sequences output by these ciphers are checked for randomness using the statistical tests defined by the NIST Test Suite. It should also be not possible to derive any information about secret key and the initial state ofthe cipher from the keystream. Therefore, ad
Style APA, Harvard, Vancouver, ISO itp.
5

Chan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Dafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.

Pełny tekst źródła
Streszczenie:
Message security remains a vital concern in cryptography. This paper introduces a novel enhancement to the classical Caesar cipher by generating a keystream from a Hyper-Ladder Graph, which combines hypergraph and ladder graph properties to produce complex and unpredictable patterns. The proposed method is evaluated against AES, DES, ChaCha20, and XChaCha20, showing superior performance in encryption time and memory efficiency, especially in constrained environments. To demonstrate broader applicability, we implemented the keystream in grayscale image watermarking. The binary keystream was fir
Style APA, Harvard, Vancouver, ISO itp.
7

Savova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.

Pełny tekst źródła
Streszczenie:
Multi-level signals and sequences have become a significant aspect of modern high-speed communication systems. Hence, to ensure the confidentiality and integrity of the transmitted information, advanced methods and devices are necessary to produce strong cryptographic properties for not only binary but also for nonbinary keystreams, which can be used in resource-constrained microcontrollers. The proposed method and apparatus generate both a balanced nonlinear 5-ary pseudo-random sequence and a binary keystream sequence. The nonlinearity is determined by applying shrinking and multiplexing tech
Style APA, Harvard, Vancouver, ISO itp.
8

KANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.

Pełny tekst źródła
Streszczenie:
This paper proposes a new technique for generating random-looking binary digits based on an irregularly decimated chaotic map. We present a class of irregularly decimated chaos-based keystream generators, related to the shrinking generator, for the generation of binary sequences. Each generator consists of two subsystems: a control subsystem and a generating subsystem, where each subsystem is based on a single chaotic map. This chaotic map is presented as a 1-D piecewise chaotic map related to the chaotic logistic map. We conduct an analysis of the dynamical behavior of the proposed map to int
Style APA, Harvard, Vancouver, ISO itp.
9

Sang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Golic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

KANSO, ALI. "SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR." International Journal of Bifurcation and Chaos 19, no. 12 (2009): 4227–35. http://dx.doi.org/10.1142/s0218127409025316.

Pełny tekst źródła
Streszczenie:
This paper proposes the construction of a new chaotic pseudorandom bit generator, which forms the main building block of a chaotic stream cipher. The design of the algorithm is based on a single chaotic map whose numerical orbit indirectly contributes towards the generation of the keystream. The latter is produced from the numerical orbit by applying a technique that searches for iterates in specific intervals [a,b], for some real numbers a and b, and outputs 0 or 1 based on the iterate preceding the targeted iterate. The generator suggested here is built up from a quadratic map. We analyze th
Style APA, Harvard, Vancouver, ISO itp.
12

Jain, Ashish, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, and Partha Chakraborty. "A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption." Complexity 2023 (February 18, 2023): 1–9. http://dx.doi.org/10.1155/2023/7249127.

Pełny tekst źródła
Streszczenie:
Cryptanalysis is the process of finding flaws or oversights in an encryption algorithm. Nearly, all encryption algorithms are carefully examined through cryptanalysis to determine the security of the system in which the encryption algorithm has been employed. A5/1 is a well-known encryption algorithm which is inbuilt in mobile phone for securing GSM communication, and therefore, cryptanalysis of this algorithm is also important. A5/1 consists of three linear feedback registers of lengths 23, 22, and 19 bits. Due to the nonlinear clocking mechanism of A5/1, cryptanalytic attacks of guess-and-de
Style APA, Harvard, Vancouver, ISO itp.
13

Hromada, Viliam, and Juraj Varga. "Phase-shift fault analysis of Trivium." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 205–20. http://dx.doi.org/10.1556/012.2015.52.2.1308.

Pełny tekst źródła
Streszczenie:
This paper deals with the phase-shift fault analysis of cipher Trivium. So far, only bit-flipping technique has been presented in the literature. The best fault attack on Trivium [13] combines bit-flipping with algebraic cryptanalysis and needs to induce 2 one-bit faults and to generate 420 bits per each keystream. Our attack combines phase-shifting and algebraic cryptanalysis and needs to phase-shift 2 registers of the cipher and to generate 120 bits per each keystream.
Style APA, Harvard, Vancouver, ISO itp.
14

SouzaBanegas, Gustavo, and Ricardo Felipe Custodio. "An Efficient Keystream for Cryptographic Applications." International Journal of Computer Applications 109, no. 2 (2015): 1–5. http://dx.doi.org/10.5120/19157-0610.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Chambers, W. G., and S. J. Shepherd. "Mutually clock-controlled cipher keystream generators." Electronics Letters 33, no. 12 (1997): 1020. http://dx.doi.org/10.1049/el:19970728.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Suwais, Khaled, and Sally Almanasra. "Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour." Applied Sciences 13, no. 8 (2023): 4669. http://dx.doi.org/10.3390/app13084669.

Pełny tekst źródła
Streszczenie:
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present an alternative stream cipher (Strike) inspired by the stochastic behaviour of lightning strike phenomena. The novelty and originality of Strike stem from the utilisation of lightning strike behaviour as a source for generating random keystreams for encryption and decryption. Strike consists of three main functions: a function for setting up the security attributes, a function for generating lightning strikes and converting the
Style APA, Harvard, Vancouver, ISO itp.
17

Kuznetsov, O. O., I. D. Gorbenko, Y. I. Gorbenko, A. M. Alekseychuk, and V. A. Tymchenko. "Mathematical structure of the Strumok stream cipher." Radiotekhnika, no. 193 (May 15, 2018): 17–27. http://dx.doi.org/10.30837/rt.2018.2.193.02.

Pełny tekst źródła
Streszczenie:
The main development results of a new keystream generator, named “Strumok”, and offered as a candidate for the national symmetric encryption standard of Ukraine, are presented. Strumok is built according to the SNOW2.0-like schema of the summation generator; increased secret key length and the initialization vector allow using reliably the stream cipher even taking into account quantum cryptographic analysis methods. The basic transformations and individual results from the cipher performance research are given, moreover, here it is shown the generator, capable of forming a keystream at speed
Style APA, Harvard, Vancouver, ISO itp.
18

Nisviasari, R., Dafik, I. H. Agustin, E. Y. Kurniawati, I. N. Maylisa, and B. J. Septory. "Improving the robustness of the affine cipher by using a rainbow antimagic coloring." Journal of Physics: Conference Series 2157, no. 1 (2022): 012017. http://dx.doi.org/10.1088/1742-6596/2157/1/012017.

Pełny tekst źródła
Streszczenie:
Abstract Nowadays, cryptosystems can be applied in several areas in life. One of them is in transaction data. In transaction data, a very strong cryptosystem is needed so that the transaction data is safe. Cryptosystems are better with a strong keystream. In this case, we use rainbow antimagic as a cryptosystem key to improve the robustness of the keystream by using affine cipher. The algorithm uses the edge weights of rainbow antimagic vertex labeling of graphs as a key for encryption and decryption. In this paper, we found the rainbow antimagic connection number of tadpole graphs and two alg
Style APA, Harvard, Vancouver, ISO itp.
19

Gu, Guo Sheng, Jie Ling, Guo Bo Xie, and Yu Yi Ou. "A Chaotic Image Encryption Algorithm Based on a Dynamical Feedback Operation." Advanced Materials Research 989-994 (July 2014): 3561–66. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.3561.

Pełny tekst źródła
Streszczenie:
This paper designs an image encryption algorithm with a dynamical feedback operation based on sensitive chaotic system. In the proposed algorithm, the piece wise linear chaotic map is selected to construct pseudo-random keystream sequences. The pseudorandom keystream sequences are used to permute and substitute the plain image data. To enhance the complexity and security of the algorithm, each pixel is dynamically confused by its two previous adjacent encrypted pixels which are specified by a quantized binary tuple derived from a chaotic element. Both theoretical analysis and experimental test
Style APA, Harvard, Vancouver, ISO itp.
20

Álvarez, G., F. Montoya, M. Romera, and G. Pastor. "Keystream cryptanalysis of a chaotic cryptographic method." Computer Physics Communications 156, no. 2 (2004): 205–7. http://dx.doi.org/10.1016/s0010-4655(03)00432-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Menicocci, R. "Intrinsic weakness of variable-memory keystream generators." Electronics Letters 30, no. 11 (1994): 850. http://dx.doi.org/10.1049/el:19940573.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Krause, Matthias. "OBDD-Based Cryptanalysis of Oblivious Keystream Generators." Theory of Computing Systems 40, no. 1 (2005): 101–21. http://dx.doi.org/10.1007/s00224-005-1282-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Klapper, Andrew. "On the Existence of Secure Keystream Generators." Journal of Cryptology 14, no. 1 (2001): 1–15. http://dx.doi.org/10.1007/s001450010014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Huang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.

Pełny tekst źródła
Streszczenie:
This paper proposes a hyperchaos-based image encryption algorithm, which consists of two scrambling-diffusion operations and one scrambling operation. In the proposed algorithm, the initial conditions of a hyperchaotic Chen system are first generated using the Message Digest 5 (MD5) value of digital images and given initial values, and then the images will be encrypted using the keystream created by the system. Since the initial values of hyperchaotic Chen systems are related to plaintext and the encryption process is related to the images, this algorithm is able to effectively protect images
Style APA, Harvard, Vancouver, ISO itp.
25

ISOBE, Takanori, Toshihiro OHIGASHI, Yuhei WATANABE, and Masakatu MORII. "Comprehensive Analysis of Initial Keystream Biases of RC4." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 1 (2014): 139–51. http://dx.doi.org/10.1587/transfun.e97.a.139.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

T, Jan Carlo. "A Keystream-Based Affine Cipher for Dynamic Encryption." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 2919–22. http://dx.doi.org/10.30534/ijeter/2020/06872020.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Parker, A. T., and K. M. Short. "Reconstructing the keystream from a chaotic encryption scheme." IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48, no. 5 (2001): 624–30. http://dx.doi.org/10.1109/81.922466.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Fuster-Sabater, A., and P. Caballero-Gil. "Global linear complexity analysis of filter keystream generators." IEE Proceedings - Computers and Digital Techniques 144, no. 1 (1997): 33. http://dx.doi.org/10.1049/ip-cdt:19970764.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Kimberley, M. "Comparison of two statistical tests for keystream sequences." Electronics Letters 23, no. 8 (1987): 365. http://dx.doi.org/10.1049/el:19870268.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Zhi-ping, Wu, Ye Ding-feng, and Ma Wei-ju. "Algebraic attack on Filter-Combiner model keystream generators." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 259–62. http://dx.doi.org/10.1007/bf02828664.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Mahdi, Mohammed, and Nidaa Hassan. "A SUGGESTED SUPER SALSA STREAM CIPHER." Iraqi Journal for Computers and Informatics 44, no. 2 (2018): 5–10. http://dx.doi.org/10.25195/ijci.v44i2.51.

Pełny tekst źródła
Streszczenie:
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specifiedfor apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsakeystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity ofkey stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion ofgenerated keystream will increase due the effect of changing the volume acting for one element of the a
Style APA, Harvard, Vancouver, ISO itp.
32

Ahmad, Musheer. "Chaos Based Mixed Keystream Generation for Voice Data Encryption." International Journal on Cryptography and Information Security 2, no. 1 (2012): 39–48. http://dx.doi.org/10.5121/ijcis.2012.2104.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Salam, Md Iftekhar, and Hoon Jae Lee. "On the algebraic attack against summation type keystream generators." International Journal of Information and Computer Security 5, no. 2 (2012): 132. http://dx.doi.org/10.1504/ijics.2012.051778.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

García-Villalba, L. J., and M. C. Rodríguez-Palánquex. "A family of keystream generators with large linear complexity." Applied Mathematics Letters 14, no. 5 (2001): 545–47. http://dx.doi.org/10.1016/s0893-9659(00)00191-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Blackburn, S. R. "Cryptanalysis of keystream generator due to Chan and Cheng." Electronics Letters 34, no. 18 (1998): 1737. http://dx.doi.org/10.1049/el:19981226.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Sang, Tao, Ruli Wang, and Yixun Yan. "Chaos-based feedforward output functions for combining keystream generators." Journal of Electronics (China) 18, no. 4 (2001): 314–20. http://dx.doi.org/10.1007/s11767-001-0045-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Wu, Shyi-Tsong. "Hybrid Chaotic Keystream Generator Based on Dawson’s Summation Generator." Sensors and Materials 35, no. 5 (2023): 1687. http://dx.doi.org/10.18494/sam4316.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Gül, Çaǧdaş, and Orhun Kara. "Correction to “A New Construction Method for Keystream Generators”." IEEE Transactions on Information Forensics and Security 19 (2024): 4198. http://dx.doi.org/10.1109/tifs.2024.3372200.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

KANSO, ALI. "CIPHER SYSTEMS BASED ON CONTROLLED EXACT CHAOTIC MAPS." International Journal of Bifurcation and Chaos 20, no. 12 (2010): 4039–53. http://dx.doi.org/10.1142/s0218127410028173.

Pełny tekst źródła
Streszczenie:
In this paper, we present a class of chaotic clock-controlled cipher systems based on two exact chaotic maps, where each map is capable of generating exact chaotic time series of the logistic map. This class is designed in such a way that one map controls the iterations of the second map. The suggested technique results in generating orbits possessing long cycle length and high level of security from the two periodic exact maps. In the first part of this paper, two keystream generators based on two exact chaotic logistic maps are suggested for use in cryptographic applications. The necessary c
Style APA, Harvard, Vancouver, ISO itp.
40

Huang, Xiaoling, and Guodong Ye. "An Image Encryption Algorithm Based on Time-Delay and Random Insertion." Entropy 20, no. 12 (2018): 974. http://dx.doi.org/10.3390/e20120974.

Pełny tekst źródła
Streszczenie:
An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in the permutation stage, a middle parameter is designed to revise the outputs of the chaotic map, yielding a temporal delay phenomena. Then, diffusion operation is applied after a group of random numbers is inserted into the permuted image. Therefore, the gray distribution can be changed and is different from that of the plain-image. This inser
Style APA, Harvard, Vancouver, ISO itp.
41

Hu, Yongsheng, Han Wu, and Luoyu Zhou. "A Novel Hyperchaotic 2D-SFCF with Simple Structure and Its Application in Image Encryption." Entropy 24, no. 9 (2022): 1266. http://dx.doi.org/10.3390/e24091266.

Pełny tekst źródła
Streszczenie:
In this paper, a novel image encryption algorithm is proposed based on hyperchaotic two-dimensional sin-fractional-cos-fractional (2D-SFCF), called sin-fractional-cos-fractional image-encryption (SFCF-IE). The 2D-SFCF is constructed from two one-dimensional cosine fractional (1-DCFs), and it has a more complex chaotic behavior with a larger parameter space than one-dimensional chaotic systems. Compared with the two-dimensional (2D) chaotic system, the 2D-SFCF has a simple structure, and the parameter space in the chaotic state is continuous, which is beneficial to generating the keystream in t
Style APA, Harvard, Vancouver, ISO itp.
42

Ouyang, Xue, Yuling Luo, Junxiu Liu, Lvchen Cao, and Yunqi Liu. "A color image encryption method based on memristive hyperchaotic system and DNA encryption." International Journal of Modern Physics B 34, no. 04 (2020): 2050014. http://dx.doi.org/10.1142/s0217979220500149.

Pełny tekst źródła
Streszczenie:
In this paper, a color image encryption method using the memristive hyperchaotic system and deoxyribonucleic acid (DNA) encryption is proposed. First, the pseudo-random sequences are generated by a keystream generation mechanism based on a memristive hyperchaotic system and the plain image. Due to this, the memristive hyperchaotic system has a complex dynamical behavior and is highly sensitive to initial conditions, the proposed keystream generation mechanism is highly random which is also dependent on the plain images. Second, a permutation based on the cycle-shift operation is designed to el
Style APA, Harvard, Vancouver, ISO itp.
43

Bulavintsev, Vadim, Alexander Semenov, Oleg Zaikin, and Stepan Kochemazov. "A Bitslice Implementation of Anderson’s Attack on A5/1." Open Engineering 8, no. 1 (2018): 7–16. http://dx.doi.org/10.1515/eng-2018-0002.

Pełny tekst źródła
Streszczenie:
Abstract The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson’s Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessin
Style APA, Harvard, Vancouver, ISO itp.
44

Chen, E., Lequan Min, and Guanrong Chen. "Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption." International Journal of Bifurcation and Chaos 27, no. 03 (2017): 1750046. http://dx.doi.org/10.1142/s0218127417500468.

Pełny tekst źródła
Streszczenie:
This paper introduces nine four-dimensional discrete chaotic systems with one-line equilibria (DCSLE), consisting of some simple sine functions. Based on the generalized chaos synchronization (GCS) theorem, a DCSLE is used to construct an eight-dimensional DCSLE GCS system. The new DCSLE GCS system is verified by numerical simulation and then used to design a chaotic pseudorandom number generator (CPRNG). The randomness of ten 100-key streams generated by the CPRNG, two GCS-based CPRNGs, the RC4 PRNG and the ZUC PRNG are tested by the SP800-22/FIPS 140-2 tests. The test results confirm that th
Style APA, Harvard, Vancouver, ISO itp.
45

Nikhil Khandare. "CLS-SE: Continuous Location Sharing Using Geffe Generator Based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 302–21. https://doi.org/10.52783/anvi.v28.4219.

Pełny tekst źródła
Streszczenie:
With high end location enabled mobile devices and high speed internet connectivity, it is very common in today’s world to share location continuously with people. However this information is very sensitive as small fraction of this information may reveal unwanted things, thus encrypting this information becomes crucial. Encryption protects this information from unwanted people and thus protects privacy of individual. For encrypting continuous location data, continuous keys are needed, which are provided by keystream generator. In this research Geffe generator is used for pseudorandom keystream
Style APA, Harvard, Vancouver, ISO itp.
46

Nikhil Khandare. "CLS-SE: Continuous Location Sharing using Geffe Generator based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 7s (2025): 257–76. https://doi.org/10.52783/anvi.v28.4502.

Pełny tekst źródła
Streszczenie:
With high end location enabled mobile devices and high speed internet connectivity, it is very common in today’s world to share location continuously with people. However this information is very sensitive as small fraction of this information may reveal unwanted things, thus encrypting this information becomes crucial. Encryption protects this information from unwanted people and thus protects privacy of individual. For encrypting continuous location data, continuous keys are needed, which are provided by keystream generator. In this research Geffe generator is used for pseudorandom keystream
Style APA, Harvard, Vancouver, ISO itp.
47

Mursidah, Ichsani, Suryadi MT, Sarifuddin Madenda, and Suryadi Harmanto. "Implementation of MS Circle Map in Digital Image Encryption." Applied Sciences 15, no. 13 (2025): 6998. https://doi.org/10.3390/app15136998.

Pełny tekst źródła
Streszczenie:
Digital data protection is crucial to prevent unauthorized modifications and tampering. A secure, reliable, and efficient encryption technique is needed to safeguard digital images. This paper proposes a novel MS Circle Map-based image encryption algorithm, integrating chaotic dynamics for enhanced security. The encryption process begins by transforming the plain image matrix into a row vector. A secret key is then used as the initial condition for the MS Circle Map to generate a chaotic keystream. The encryption is performed through pixel diffusion using an XOR operation between the pixel int
Style APA, Harvard, Vancouver, ISO itp.
48

ZHANG, Xiaoyan, Qichun WANG, Bin WANG, and Haibin KAN. "A Constructive Method of Algebraic Attack with Less Keystream Bits." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 10 (2011): 2059–62. http://dx.doi.org/10.1587/transfun.e94.a.2059.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Awad, Wasan Shaker. "Finding Linear Equivalence of Keystream Generators Using Genetic Simulated Annealing." Information Technology Journal 7, no. 3 (2008): 541–44. http://dx.doi.org/10.3923/itj.2008.541.544.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Golic, J. D., and S. V. Petrovic. "Correlation attacks on clock-controlled shift registers in keystream generators." IEEE Transactions on Computers 45, no. 4 (1996): 482–86. http://dx.doi.org/10.1109/12.494106.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!