نتایج جستجو برای: stream cipher

تعداد نتایج: 68611  

Journal: :Cryptography 2023

Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to generic attack called ’bit-flipping’, in which the ciphertext is modified decrypt into fraudulent message. While authenticated encryption and message authentication codes can effectively negate this attack, modes also provide partial protection against bit-flipping. PudgyTurtle stream-cipher mode uses keystre...

2007
Azman Samsudin Khaled M. Suwais

DSP-128 is a new multithreaded stream cipher based on the intractability of the Discrete Logarithm Problem (DLP) with key size of 128-bit. The design of DSP-128 is divided into three stages: Initialization Stage, Keystream Generation Stage, and Encryption Stage. The design goal of DSP-128 is to come up with a secure stream cipher with good performance for data encryption. The experimental resul...

Journal: :Des. Codes Cryptography 2013
Orr Dunkelman Nathan Keller

In [6], Biryukov presented a new methodology of stream cipher design called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity, and performance, was expected to be selected to the eSTREAM portfolio. In this paper we ...

Journal: :The European Physical Journal Special Topics 2014

Journal: :Computer Science and Information Systems 2013

Journal: :IACR transaction on symmetric cryptology 2021

It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs at least twice length secret key. In FSE 2015, Armknecht and Mikhalev however proposed Sprout with Grain-like architecture, whose was equal key yet resistant attacks. Although had other weaknesses, it germinated sequence designs like Lizard Plantl...

2005
Li An-Ping

In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the simple construction, DICING has satisfactory performance, faster than AES about two times. For the security, there have not been found weakness for the known attacks, the key sizes can be 128 bits and 256 bits respectively.

2005
Johan H̊astad Mats Näslund

We propose a new stream cipher called “Polar Bear”. It combines constructions used successfully in other situations. The key initialization uses Rijndael, the steady state uses a dynamic table as in RC4 and we guarantee a long period through the use of a linear feedback shiftregister. The efficiency for short messages is better than that of RC4 while for long messages Polar Bear is about a fact...

2008
Orr Dunkelman Nathan Keller

In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید