A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm
Discrete logarithmic pseudorandom number generators are a prevailing class of
cryptographically-secure pseudorandom number generators (CSPRNGs). In generators of …
cryptographically-secure pseudorandom number generators (CSPRNGs). In generators of …
A novel clock gating approach for the design of low-power linear feedback shift registers
This paper presents an efficient solution to reduce the power consumption of the popular
linear feedback shift register by exploiting the gated clock approach. The power reduction …
linear feedback shift register by exploiting the gated clock approach. The power reduction …
[HTML][HTML] A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher
P Du, Y Dong, Q Cui, H Li - Applied Sciences, 2024 - mdpi.com
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity
and are widely used in pseudo-random number generators. However, their period is limited …
and are widely used in pseudo-random number generators. However, their period is limited …
From random numbers to random objects
Many security-related scenarios including cryptography depend on the random generation
of passwords, permutations, Latin squares, CAPTCHAs and other types of non-numerical …
of passwords, permutations, Latin squares, CAPTCHAs and other types of non-numerical …
[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach
B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …
secure cryptosystem guarantees that the malicious third party cannot guess anything …
[PDF][PDF] Recent Results on Some Word Oriented Stream Ciphers: SNOW 1.0, SNOW 2.0 and SNOW 3G
S Nandi, S Krishnaswamy, P Mitra - Information Security and Privacy in the …, 2022 - arxiv.org
In this chapter, we have studied three word-oriented stream ciphers SNOW 1.0, SNOW 2.0
and SNOW 3G in a detailed way. The detailed description includes the working principles of …
and SNOW 3G in a detailed way. The detailed description includes the working principles of …
A Scheme to resist Fast Correlation Attack for Word Oriented LFSR based Stream Cipher
S Nandi, S Krishnaswamy, P Mitra - arXiv preprint arXiv:2307.02182, 2023 - arxiv.org
In LFSR-based stream ciphers, the knowledge of the feedback equation of the LFSR plays a
critical role in most attacks. In word-based stream ciphers such as those in the SNOW series …
critical role in most attacks. In word-based stream ciphers such as those in the SNOW series …
IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm
This paper deals with an updated SNOW 3G key stream generator (KSG). The proposed
KSG can be applied to encrypt images in the Internet of Things (IoT) applications. The KSG …
KSG can be applied to encrypt images in the Internet of Things (IoT) applications. The KSG …
Chakravyuha: A Scheme to Resist Fast Correlation Attack for Word Oriented LFSR based Stream Cipher
S Nandi, S Krishnaswamy, NN GS, P Mitra - 2024 - researchsquare.com
In LFSR-based stream ciphers, the knowledge of the feedback equation of the LFSR plays a
critical role in most attacks. In word-based stream ciphers such as those in the SNOW series …
critical role in most attacks. In word-based stream ciphers such as those in the SNOW series …
[PDF][PDF] HWKA: A Novel Homomorphic Encryption and k-center Algorithm for Secure Storage of English Data
H Liu - International Journal of Network Security, 2023 - ijns.jalaxy.com.tw
Aiming at the security problem of English private data in a cloud environment, this paper
puts forward a novel homomorphic encryption and k-center algorithm for the secure storage …
puts forward a novel homomorphic encryption and k-center algorithm for the secure storage …