Privacy protection based on stream cipher for spatiotemporal data in IoT

T Liu, Y Wang, Y Li, X Tong, L Qi… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is
very important. In this article, cryptography-based methods are utilized to protect participants' …

[PDF][PDF] Studies on statistical analysis and performance evaluation for some stream ciphers

I Gorbenko, A Kuznetsov, Y Gorbenko… - International Journal of …, 2019 - academia.edu
This paper presents the results of the comparative analysis of safety statistics and
performance of encryption, the Strumok stream symmetric cipher (proposed for the national …

Proposed Enhancement of A5/1 stream cipher

SB Sadkhan, Z Hamza - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
A5/1 used in GSM to encrypt the conversations. In this paper, proposed an enhancement of
A5/1 is add fourth register will be increase the total security of proposed algorithm and apply …

Lightweight encryption with data and device integrity using NLFSR and PUF for the Internet of Medical Things

P Kumari, B Mondal - Internet of Things, 2024 - Elsevier
Abstract Nowadays the Internet of Medical Things (IoMT) is in top demand; they
communicate with each other in an IoT network, but there are various security issues …

[PDF][PDF] Evolutionary approach to secure mobile telecommunication networks

A Ghazli, A Alipacha, NH Said - Indonesian Journal of …, 2021 - pdfs.semanticscholar.org
A series of encryption algorithms called A5 is used to secure mobile telephone
communications, producing a pseudo-random sequence that will be exclusive OR (XORed) …

Randomness Evaluation of Modified A5/1 Stream Cipher for Global System for Mobile Communication

SYAM Fauzi, M Othman, FMM Shuib… - Malaysian Journal of …, 2018 - mjosht.usim.edu.my
While the A5/1 stream cipher encryption is known to aid in providing security and privacy for
the mobile communication, it actually has numerous security vulnerabilities that leave it …

Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher

D Upadhyay, T Shah, P Sharma - 2015 19th International …, 2015 - ieeexplore.ieee.org
With increasing use of network applications, security has become a major issue. Strong
encryption mechanisms are required for securing important data. This encryption is provided …

Security Enhancement of A5/1 Stream Cipher in GSM Communication & its Randomness Analysis

RP Prajapat, R Bhadada… - 2021 IEEE 6th …, 2021 - ieeexplore.ieee.org
Global System for Mobile (GSM) is still widely used cellular standard providing many
services like Voice, SMS & Data Service with mobility. To secure information in the GSM …

Improvement A5/1 encryption algorithm based on sponge techniques

HBA Wahab, MA Mohammed - 2015 World Congress on …, 2015 - ieeexplore.ieee.org
A5/1 stream cipher is used in Global System for Mobile Communications (GSM) in order to
provide privacy on air communication. In this paper introduce new improvements to the A5/1 …

Analysis of the randomness performance of the proposed stream cipher based cryptographic algorithm

DG Brosas, AM Sison, AA Hernandez… - 2020 11th IEEE …, 2020 - ieeexplore.ieee.org
In the cryptographic field, it is a cryptosystem practice to use a secret key together with a
cryptographic algorithm parameter. These cryptographic algorithms should produce …