Works matching DE "STREAM ciphers"
Results: 320
Rethinking Stream Ciphers: Can Extracting be Better than Expanding?
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 1, p. 77, doi. 10.1007/s11277-013-1159-z
- By:
- Publication type:
- Article
Folding-BSD Algorithm for Binary Sequence Decomposition.
- Published in:
- Computers (2073-431X), 2020, v. 9, n. 4, p. 100, doi. 10.3390/computers9040100
- By:
- Publication type:
- Article
双混沌自同步流密码算法的设计与应用.
- Published in:
- Telecommunication Engineering, 2023, v. 63, n. 9, p. 1391, doi. 10.20079/j.issn.1001-893x.220617001
- By:
- Publication type:
- Article
改进混沌方程及其在保密VoIP 系统中的应用与实现.
- Published in:
- Telecommunication Engineering, 2022, v. 62, n. 7, p. 971, doi. 10.3969/j.issn.1001-893x.2022.07.021
- By:
- Publication type:
- Article
СИНТЕЗ ГРУПИ ОПЕРАЦІЙ СТРОГОГО СТІЙКОГО КРИПТОГРАФІЧНОГО КОДУВАННЯ ДЛЯ ПОБУДОВИ ПОТОКОВИХ ШИФРІВ
- Published in:
- Ukrainian Scientific Journal of Information Security, 2018, v. 24, n. 3, p. 195, doi. 10.18372/2225-5036.24.13430
- By:
- Publication type:
- Article
DEVELOPMENT AND INVESTIGATION OF THE KEY STREAM GENERATORS ON THE BASE OF CELLULAR AUTOMATA.
- Published in:
- Radio Electronics, Computer Science, Control, 2015, v. 3, p. 58, doi. 10.15588/1607-3274-2015-3-7
- By:
- Publication type:
- Article
Comparison of a Chaotic Cryptosystem with Other Cryptography Systems.
- Published in:
- Engineering, Technology & Applied Science Research, 2020, v. 10, n. 5, p. 6187, doi. 10.48084/etasr.3745
- By:
- Publication type:
- Article
Synchronization of Two Chaotic Stream Ciphers in Secure CDMA Communication Systems.
- Published in:
- Engineering, Technology & Applied Science Research, 2020, v. 10, n. 4, p. 5947, doi. 10.48084/etasr.3569
- By:
- Publication type:
- Article
Design and Implementation of a Statistical Testing Framework for a Lightweight Stream Cipher.
- Published in:
- Engineering, Technology & Applied Science Research, 2020, v. 10, n. 1, p. 5132, doi. 10.48084/etasr.3250
- By:
- Publication type:
- Article
A Novel Image Stream Cipher Based On Dynamic Substitution.
- Published in:
- Engineering, Technology & Applied Science Research, 2016, v. 6, n. 5, p. 1195, doi. 10.48084/etasr.729
- By:
- Publication type:
- Article
THE SECURITY ANALYSIS ON THE RABBIT STREAM CIPHER.
- Published in:
- International Journal on Information Technologies & Security, 2024, v. 16, n. 2, p. 91, doi. 10.59035/swyf4934
- By:
- Publication type:
- Article
Image Encryption using Gingerbreadman Map And RC4A Stream Cipher.
- Published in:
- Applications & Applied Mathematics, 2020, v. 15, n. 2, p. 1230
- By:
- Publication type:
- Article
Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 261, doi. 10.3390/fi16080261
- By:
- Publication type:
- Article
Design of an SoC Based on 32-Bit RISC-V Processor with Low-Latency Lightweight Cryptographic Cores in FPGA.
- Published in:
- Future Internet, 2023, v. 15, n. 5, p. 186, doi. 10.3390/fi15050186
- By:
- Publication type:
- Article
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform †.
- Published in:
- Future Internet, 2023, v. 15, n. 2, p. 54, doi. 10.3390/fi15020054
- By:
- Publication type:
- Article
Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 2, p. 1, doi. 10.1177/1550147720908748
- By:
- Publication type:
- Article
SECURING COMMUNICATION IN CHATTER APPLICATION.
- Published in:
- Annals of DAAAM & Proceedings, 2021, v. 32, p. 90, doi. 10.2507/32nd.daaam.proceedings.013
- By:
- Publication type:
- Article
ON THE $k$ -ERROR LINEAR COMPLEXITY OF SEQUENCES FROM FUNCTION FIELDS.
- Published in:
- Bulletin of the Australian Mathematical Society, 2020, v. 102, n. 2, p. 342, doi. 10.1017/S0004972719001321
- By:
- Publication type:
- Article
Encryption of Video Main Frames in the Field of DCT Transform Using A5/1 and W7 Stream Encryption Algorithms.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2014, v. 39, n. 5, p. 4077, doi. 10.1007/s13369-014-1077-8
- By:
- Publication type:
- Article
A new class of quaternary generalized cyclotomic sequences of order and length with high linear complexity.
- Published in:
- International Journal of Wavelets, Multiresolution & Information Processing, 2018, v. 16, n. 1, p. -1, doi. 10.1142/S0219691318500066
- By:
- Publication type:
- Article
Parallel distributed compensation scheme for chaotic masking system via Rivest cipher 4 stream cipher.
- Published in:
- IET Control Theory & Applications (Wiley-Blackwell), 2023, v. 17, n. 10, p. 1413, doi. 10.1049/cth2.12471
- By:
- Publication type:
- Article
Comprehensive analysis of services towards Data Aggregation, Data Fusion and enhancing security in IoT-based smart home.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2024, v. 10, p. 1, doi. 10.4108/eetiot.6703
- By:
- Publication type:
- Article
Applied study on cryptographic functions for algorithms used in communications security protocols.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2020, v. 23, n. 1, p. 243, doi. 10.21279/1454-864X-20-I1-033
- By:
- Publication type:
- Article
Design and Implementation of a New DNA Based Stream Cipher Algorithm using Python.
- Published in:
- Egyptian Computer Science Journal, 2020, v. 44, n. 1, p. 102
- By:
- Publication type:
- Article
Trivium hardware implementations for power reduction.
- Published in:
- International Journal of Circuit Theory & Applications, 2017, v. 45, n. 2, p. 188, doi. 10.1002/cta.2281
- By:
- Publication type:
- Article
Improving the lightweight implementation of SNOW-V.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 5823, doi. 10.1007/s11276-023-03348-y
- By:
- Publication type:
- Article
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2987, doi. 10.1007/s11276-024-03714-4
- By:
- Publication type:
- Article
ON STREAM CIPHER BASED ON FAMILY OF GRAPHS D(n,q) OF INCREASING GIRTH.
- Published in:
- Albanian Journal of Mathematics, 2014, v. 8, n. 1, p. 37, doi. 10.51286/albjm/1418641986
- By:
- Publication type:
- Article
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2015, v. 11, n. 1, p. 42, doi. 10.33762/eeej.2015.102713
- By:
- Publication type:
- Article
Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’ Dilemma.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 2685, doi. 10.32604/cmc.2023.036161
- By:
- Publication type:
- Article
Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation.
- Published in:
- Computers, Materials & Continua, 2019, v. 59, n. 1, p. 119, doi. 10.32604/cmc.2019.05770
- By:
- Publication type:
- Article
Design of Feedback Shift Register of Against Power Analysis Attack.
- Published in:
- Computers, Materials & Continua, 2019, v. 58, n. 2, p. 517, doi. 10.32604/cmc.2019.03680
- By:
- Publication type:
- Article
High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources.
- Published in:
- Computers, Materials & Continua, 2019, v. 58, n. 1, p. 1, doi. 10.32604/cmc.2019.02171
- By:
- Publication type:
- Article
The Self-Shrinking Conflation Generator: A Proposed Improvement to the Self-Shrinking Generator.
- Published in:
- European Journal of Pure & Applied Mathematics, 2022, v. 15, n. 4, p. 1426, doi. 10.29020/nybg.ejpam.v15i4.4504
- By:
- Publication type:
- Article
A New Method for Generating High Non-linearity S-Boxes.
- Published in:
- Radioengineering, 2010, v. 19, n. 1, p. 23
- By:
- Publication type:
- Article
On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13634-017-0508-6
- By:
- Publication type:
- Article
An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network.
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 3, p. 2261, doi. 10.1007/s11277-023-10382-8
- By:
- Publication type:
- Article
A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems.
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 3, p. 1661, doi. 10.1007/s11277-023-10349-9
- By:
- Publication type:
- Article
Internet of Things Big Data Security in Cloud via Stream Cipher and Clustering Model.
- Published in:
- Wireless Personal Communications, 2022, v. 123, n. 4, p. 3483, doi. 10.1007/s11277-021-09299-x
- By:
- Publication type:
- Article
CCSC—DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment.
- Published in:
- Wireless Personal Communications, 2022, v. 122, n. 4, p. 3633, doi. 10.1007/s11277-021-09104-9
- By:
- Publication type:
- Article
Optimized Implementations for ZUC-256 on FPGA.
- Published in:
- Wireless Personal Communications, 2021, v. 116, n. 3, p. 2615, doi. 10.1007/s11277-020-07813-1
- By:
- Publication type:
- Article
Lightweight Cryptography: A Solution to Secure IoT.
- Published in:
- Wireless Personal Communications, 2020, v. 112, n. 3, p. 1947, doi. 10.1007/s11277-020-07134-3
- By:
- Publication type:
- Article
A Novel Cryptosystem based on Chaotic Signals for Data Encryption Applications and CDMA Communication System.
- Published in:
- Przegląd Elektrotechniczny, 2022, v. 98, n. 2, p. 10, doi. 10.15199/48.2022.02.03
- By:
- Publication type:
- Article
A Stream Cipher Generator Based on a Combination of Two Non-linear Systems for Secure Signal Transmissions.
- Published in:
- Przegląd Elektrotechniczny, 2020, v. 96, n. 10, p. 51, doi. 10.15199/48.2020.10.09
- By:
- Publication type:
- Article
MODELING RELATIONSHIPS IN NON-COMMUTATIVE TWO-OPERAND TWO-BIT CET-OPERATIONS OF A DOUBLE CYCLE WHEN PERMUTING THE OPERANDS.
- Published in:
- Technology Audit & Production Reserves, 2024, v. 3, n. 2(77), p. 30, doi. 10.15587/2706-5448.2024.306980
- By:
- Publication type:
- Article
Fast and Secure Image Encryption System Using New Lightweight Encryption Algorithm.
- Published in:
- TEM Journal, 2024, v. 13, n. 1, p. 198, doi. 10.18421/TEM131-20
- By:
- Publication type:
- Article
Designing a Graphical Domain-Specific Modeling Language for Efficient Block Cipher Configuration: BCLang.
- Published in:
- TEM Journal, 2023, v. 12, n. 4, p. 2038, doi. 10.18421/TEM124-14
- By:
- Publication type:
- Article
A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 21, p. 9719, doi. 10.3390/app14219719
- By:
- Publication type:
- Article
Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 8, p. 4669, doi. 10.3390/app13084669
- By:
- Publication type:
- Article
Design and Security Analysis of Cryptosystems.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 3, p. 1427, doi. 10.3390/app13031427
- By:
- Publication type:
- Article