A modernistic way for KEY generation for highly secure data transfer in ASIC design flow
TR Patnala, D Jayanthi, S Majji, M Valleti… - 2020 6th …, 2020 - ieeexplore.ieee.org
Present day's data security plays a vital role in digital human life. Data is a valuable asset to
any organization and hence its security from external attacks is very important. Information …
any organization and hence its security from external attacks is very important. Information …
Performance analysis of current lightweight stream ciphers for constrained environments
Maintaining an adequate balance between security and other performance metrics like
memory requirement, throughput and energy requirement in a resource-constrained …
memory requirement, throughput and energy requirement in a resource-constrained …
[PDF][PDF] Comparing some pseudo-random number generators and cryptography algorithms using a general evaluation pattern
A Gaeini, A Mirghadri, G Jandaghi… - … and Computer Science, 2016 - academia.edu
Since various pseudo-random algorithms and sequences are used for cryptography of data
or as initial values for starting a secure communication, how these algorithms are analyzed …
or as initial values for starting a secure communication, how these algorithms are analyzed …
Performance and statistical analysis of stream ciphers in GSM communications
N Yerukala, VK Prasad, A Apparao - Journal of Communications …, 2020 - hrcak.srce.hr
Sažetak For a stream cipher to be secure, the keystream generated by it should be uniformly
random with parameter 1/2. Statistical tests check whether the given sequence follow a …
random with parameter 1/2. Statistical tests check whether the given sequence follow a …
A Nonlinear Stream Cipher for Encryption of Test Patterns in Streaming Scan Networks
With the biennial doubling of the number of transistors in a given area of silicon,
contemporary integrated circuits (IC) are forging more and more often and will continue to …
contemporary integrated circuits (IC) are forging more and more often and will continue to …
[PDF][PDF] Randomness evaluation framework of cryptographic algorithms
CL Duta, BC Mocanu, FA Vladescu… - International Journal on …, 2014 - academia.edu
Nowadays, computer systems are developing very rapidly and become more and more
complex, which leads to the necessity to provide security for them. This paper is intended to …
complex, which leads to the necessity to provide security for them. This paper is intended to …
[PDF][PDF] Linear approximations for 2-round trivium
Trivium, designed by De Canniere and Preneel, is one of the focus ciphers of Phase II for the
eSTREAM project. In this paper, we model the initialization part of Trivium as an 8-round …
eSTREAM project. In this paper, we model the initialization part of Trivium as an 8-round …
An efficient lightweight stream cipher algorithm for wireless networks
A significant number of applications in mobile transactions and wireless sensor networks
(WSNs) are characterized by short duration sessions. Stream ciphers are a popular choice …
(WSNs) are characterized by short duration sessions. Stream ciphers are a popular choice …
On the design of Trivium
Y Tian, G Chen, J Li - Cryptology ePrint Archive, 2009 - eprint.iacr.org
Abstract eSTREAM called for new stream ciphers designed for niche areas such as
exceptional performance in software and hardware where resources are restricted. This …
exceptional performance in software and hardware where resources are restricted. This …
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32
M Joseph, G Sekar… - The Computer Journal, 2024 - academic.oup.com
The synchronous stream ciphers RCR-64 and RCR-32 designed by Sekar, Paul and
Preneel are strengthened variants of the ciphers TPy and TPypy (designed by Biham and …
Preneel are strengthened variants of the ciphers TPy and TPypy (designed by Biham and …