نتایج جستجو برای: stream cipher

تعداد نتایج: 68611  

2008
Alex Biryukov

In this paper we define a notion of leak extraction from a block cipher. We demonstrate this new concept on an example of AES. A result is LEX: a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.

2000
Alex Biryukov Adi Shamir

In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoo curve T M 2 = N 2 for 1 T N. Recently, Babbage and Golic pointed out that a diierent T M = N tradeoo attack for 1 T D is applicable to stream ciphers, where D is the amount of output data available to the attacker. In this paper we show that a co...

Journal: :IACR Cryptology ePrint Archive 2001
Marina Pudovkina

Stream ciphers are an important class of encryption algorithms, which are widely used in practice. In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintext attacks on this cipher. The complexities of these attacks can be estimated as 10 and 10.

Journal: :IACR Cryptology ePrint Archive 2005
Hongjun Wu

Nawaz, Gupta and Gong recently proposed a 32-bit RC4-like stream cipher. In this paper, we show that the keystream generated from their stream cipher is not random. The keystream can be distinguished from random with only about 100 outputs (3200 bits) in 2 milliseconds on Intel Centrino 1.6GHz processor.

2006
Alex Biryukov

In this paper we define a notion of leak extraction from a block cipher. We demonstrate this new concept on an example of AES. A result is LEX: a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.

2009
Maqsood Mahmud Muhammad Khurram Khan Khaled Alghathbar

Generally, a stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudorandom Keystream bits to achieve desired cipher text. In our paper, we are proposing a cryptosystem named Biometric-GaussianStream(BGS) cryptosystem. It is basically the combination of Gaussian noise and stream ciphers. In this system first, we pass an image through Gaussian noise function to add...

Journal: :Nonlinear Theory and Its Applications, IEICE 2017

Journal: :International Journal of Wireless and Mobile Computing 2007

2004
Adi Shamir

Secret key cryptography was traditionally divided into block ciphers and stream ciphers, but over the last 30 years the balance had steadily shifted, and today stream ciphers have become an endangered species. In this talk I'll survey the current state of the art in stream ciphers: who needs them, who uses them, how they are attacked, and how they can be protected by new types of constructions.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید