Search

Your search keyword '"Keystream"' showing total 651 results

Search Constraints

Start Over You searched for: Descriptor "Keystream" Remove constraint Descriptor: "Keystream"
651 results on '"Keystream"'

Search Results

1. Hardware-based efficient Mickey-128 stream cipher with unrolling factors for throughput enhancement.

2. Keystream

4. An efficient Grain-80 stream cipher with unrolling features to enhance the throughput on hardware platform.

6. Software Implementation of Plantlet Stream Cipher Using Verilog Hardware Description Language

7. State Transition Analysis of GSM Encryption Algorithm A5/1

9. State Transition Analysis of GSM Encryption Algorithm A5/1.

10. Performance and Statistical Analysis of Stream ciphers in GSM Communications

12. Implementation of super H-antimagic total graph on establishing stream cipher

13. Generalization of Roos bias in RC4 and some results on key-keystream relations

14. Image block generation from block-based SMRT in colour image encryption and its performance analysis

15. Performance and Statistical Analysis of Stream Ciphers in GSM Communications.

16. Smashing WEP in a Passive Attack

17. Some Results on Related Key-IV Pairs of Grain

18. A Theoretical Analysis of the Structure of HC-128

19. Attack on Broadcast RC4 Revisited

20. Design of a Novel Pseudo Random Generator based on Walsh Hadamard Transform and Bi S-Boxes.

21. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

22. Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck

23. Analysis of RC4 and Proposal of Additional Layers for Better Security Margin

24. Cryptanalysis of Rabbit

25. On the Statistical Analysis of ZUC, Espresso and Grain v1

26. An efficient grayscale image encryption scheme based on variable length row-column swapping operations

27. Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion.

28. Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing

29. Highly Reliable Synchronous Stream Cipher System for Link Encryption

30. Deep Learning based Cryptanalysis of Stream Ciphers

31. Security analysis of Subterranean 2.0

32. Differential Fault Attack on the Stream Cipher LIZARD

33. An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round

34. Image encryption algorithm with circle index table scrambling and partition diffusion

35. Melting SNOW-V: improved lightweight architectures

36. Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G

37. Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT

39. Image multi‐encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform

40. A novel batch image encryption algorithm using parallel computing

41. A differential fault attack on the WG family of stream ciphers

42. Performance and Statistical Analysis of Stream ciphers in GSM Communications

43. Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher

44. Breaking a novel image encryption scheme based on an improper fractional order chaotic system.

45. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions.

46. A new security relation between information rate and state size of a keystream generator.

47. Cryptographic Capability Computing

48. Evolutionary approach to secure mobile telecommunication networks

49. Quantum security of Grain-128/Grain-128a stream cipher against HHL algorithm

50. Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion

Catalog

Books, media, physical & digital resources