[PDF][PDF] An effective color image encryption scheme based on double piecewise linear chaotic map method and rc4 algorithm
DW Ahmed, TM Jawad… - Journal of Engineering …, 2021 - jestec.taylors.edu.my
Fast and secure data stored and transmission through a modern communication and
information system are the core objective in this area. With regard to this study, efficient and …
information system are the core objective in this area. With regard to this study, efficient and …
A modified key scheduling algorithm for RC4
SM Hameed, IN Mahmood - Iraqi Journal of Science, 2016 - ijs.uobaghdad.edu.iq
Abstract Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet
protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4 …
protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4 …
Image Encryption based on Chaotic Blocks Shuffling and RC4
The necessity for image encryption has grown significantly, especially the rapid
development of the Internet of Things (IoT) fast development and the ease with which …
development of the Internet of Things (IoT) fast development and the ease with which …
[PDF][PDF] An enhanced rc4 algorithm using an efficient PRNG generation method based on newton raphson method, SHA-1 and piecewise chaos method
TM Jawad, LM Jawad, DW Ahmed - J Xi'an Univ Architec Technol, 2020 - researchgate.net
Nowadays, text encryption is very essential, especially when it is transmitted or stored over
insecure channels such as the internet. This research proposes a new approach of text …
insecure channels such as the internet. This research proposes a new approach of text …
New cryptanalytic results on the effect of invariance weakness in the KSAm mechanism
B Crainicu, A Gergely - 2017 16th RoEduNet Conference …, 2017 - ieeexplore.ieee.org
In this paper we review the proposed RC4 key scheduling algorithm called KSAm, and we
present new cryptanalytic results concerning the effect of the Fluhrer-Mantin-Shamir …
present new cryptanalytic results concerning the effect of the Fluhrer-Mantin-Shamir …
Modified RC-4 Algorithm Against FMS Attack
P Jindal, H Menda, D Rongali, Shraddha - 3rd International Conference on …, 2020 - Springer
RC4 is the simplest and most widely adopted stream cipher which finds its application in
Wired Equivalent Privacy Protocol (WEP) and Wi-Fi-protected access (WPA). Being the …
Wired Equivalent Privacy Protocol (WEP) and Wi-Fi-protected access (WPA). Being the …