نتایج جستجو برای: stream ciphers

تعداد نتایج: 59892  

Journal: :IACR Cryptology ePrint Archive 2007
An-Ping Li

In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream cipher and block cipher. Hence, the new type of cipher has fast rate like a stream cipher and need no MAC. .

Journal: :Communications in Nonlinear Science and Numerical Simulation 2011

Journal: :Inf. Process. Lett. 2008
Orr Dunkelman Nathan Keller

Time-Memory Tradeoff (TMTO) attacks on stream ciphers are a serious security threat and the resistance to this class of attacks is an important criterion in the design of a modern stream cipher. TMTO attacks are especially effective against stream ciphers where a variant of the TMTO attack can make use of multiple data to reduce the off-line and the on-line time complexities of the attack (give...

Journal: :IACR Cryptology ePrint Archive 2017
Matthias Krause

Time-Memory-Data tradeoff attacks (TMD-attacks) like those of Babbage [1], Biryukov and Shamir [2] and Dunkelman, Keller [5] reduce the security level of keystream generator based-stream ciphers to L/2, where L denotes the inner state length. This is one of the reasons why stream ciphers like Trivium [3] and Grain [8] use a session key length n of at most L/2. In this paper, we deal with the qu...

2010
Ruming Yin Jian Yuan Qiuhua Yang Xiuming Shan Xiqin Wang

Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In this paper, we apply linear cryptanalysis to a chaotic stream cipher which was designed by strictly using the basic design criterion of cryptosystem – confusion and diffusion. We show that this well-designed chaos-based stream cipher is still insecure against distinguishing attack. This distinguis...

Journal: :Proceedings of the West Virginia Academy of Science 2023

JOHNNA SMITH, Dept of Mathematics, Shepherd University, Shepherdstown, WV, 25443, and DONALD MILLS, Computer Sciences, Engineering, 25443. Analysis basic cryptographic concepts recent open problems in hash function security. 
 The objectives this study are to show an understanding as well highlight involving method used included reading the first five chapters Cryptography: Theory Practice...

Journal: :Journal of communications software and systems 2020

Journal: :International Journal of Advanced Computer Science and Applications 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید