RC4 encryption-A literature survey

P Jindal, B Singh - Procedia Computer Science, 2015 - Elsevier
A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in
this paper. We have summarized the various weaknesses of RC4 algorithm followed by the …

[PDF][PDF] A survey on RC4 stream cipher

P Jindal, B Singh - International Journal of Computer Network and …, 2015 - mecs-press.net
RC4 is one of the most widely used stream cipher due to its simplicity, speed and efficiency.
In this paper we have presented a chronological survey of RC4 stream cipher demonstrating …

Optimization of the security-performance tradeoff in RC4 encryption algorithm

P Jindal, B Singh - Wireless Personal Communications, 2017 - Springer
In this paper, we have investigated different vulnerabilities in RC4 and its enhanced variants
to overcome the security attacks. It is established that in spite of several proposals, RC4 is …

A novel symmetric cryptography algorithm for fast and secure encryption

A Achuthshankar… - 2015 IEEE 9th International …, 2015 - ieeexplore.ieee.org
Data encryption is the best way to provide secure communication. Even though a lot of
encryption schemes are available, this paper proposes a simple, fast and secure encryption …

Design of a built-in-self-test implemented AES crypto processor ASIC

MS Rahman, ML Ali - 2020 11th International Conference on …, 2020 - ieeexplore.ieee.org
This paper presents the design of a (built-in self-test) BIST implemented Advanced
Encryption Standard (AES) crypto-processor Application-Specific Integrated Circuit (ASIC) …

[HTML][HTML] Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket

ATV Eleonore, GNER Christian, KC Hubert - Journal of Information …, 2023 - scirp.org
Supermarkets and large-scale retail stores are usually subject to huge monetary
transactions for certain customers' purchases. The computerization of these systems is …

An Improved RC4 Algorithm Based on Multi Chaotic Map for Image Encryption

R Munir - 2023 IEEE 8th International Conference on Recent …, 2023 - ieeexplore.ieee.org
RC4 algorithm is a famous stream cipher. It could be used to encrypt images quickly and
efficient. However, the RC4 has been proved has some drawbacks, therefore it is …

Implementation of reversible Data Hiding in Encrypted Image using AS Algorithm

A Achuthshankar, A Achuthshankar… - … on Green Computing …, 2015 - ieeexplore.ieee.org
Data encryption is the best way to provide secure communication. The paper presents a
novel approach to data hiding using a symmetric stream cipher known as AS Algorithm …

[PDF][PDF] A Survey of various Online Transaction Applications & Security

MN Ahmed, M Hussain - researchgate.net
Due to rapid development in the field of Internet application, protection of these data is an
important issue during the transmission from one end to another end ie between sender and …

Design of a double AES processor

UK Roy, ML Ali - … 7th International Conference on Electrical and …, 2012 - ieeexplore.ieee.org
Advanced Encryption Standard (AES) is now widely used in different kinds of applications in
software and hardware implementations. This paper presents the design and simulation of a …