With the rapid proliferation of malware attacks on the Internet, understanding these malicious behaviors plays a critical role in crafting effective defense. Advanced malware …
ML Barakat, AS Mansingka, AG Radwan… - IET image …, 2014 - Wiley Online Library
This study presents hardware realisation of chaos‐based stream cipher utilised for image encryption applications. A third‐order chaotic system with signum non‐linearity is …
RM Zaki, HBA Wahab - International Journal of Interactive …, 2021 - search.ebscohost.com
Abstract Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a …
In this paper, the hardware implementations of six representative stream ciphers are compared in terms of performance, consumed area and the throughput-to-area ratio. The …
S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra - Ieee Access, 2022 - ieeexplore.ieee.org
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) for-LFSRs.-LFSRs with such configurations can be applied to any …
L Zhang, L Xia, Z Liu, J Jing… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
SNOW 3G and ZUC are both the heart of secure algorithm sets in 3GPP LTE-Advanced, which is the potential candidate for 4G mobile broadband communication standard. In this …
In this paper a hardware implementation of ZUC stream cipher is presented. ZUC is a stream cipher that forms the heart of the 3GPP confidentiality algorithm 128-EEA3 and the 3GPP …
To date, the basic idea for implementing stream ciphers has been confined to individual standalone designs. In this paper, we introduce the notion of integrated implementation of …
Quantum computing is a serious threat for contemporary cryptography and, in order to address this threat, key sizes used for symmetric cryptography should be doubled, most …