[HTML][HTML] LEA: link encryption algorithm proposed stream cipher algorithm

HMS El Hennawy, AEA Omar, SMA Kholaif - Ain Shams Engineering …, 2015 - Elsevier
Cryptographic algorithms for confidentiality and authentication play a major important role in
nowadays information security Sen (2012)[1]. Encryption algorithms are becoming more …

[ΒΙΒΛΙΟ][B] Sequential Experiments with Primes

M Caragiu - 2017 - Springer
This book is actually about the mathematical life and destiny of mathematics faculty and their
talented students in small undergraduate colleges (not necessarily the elite ones, which are …

[HTML][HTML] Arrays composed from the extended rational cycle

D Gomez-Perez, AI Gomez, A Tirkel - Advances in Mathematics of …, 2017 - aimsciences.org
We present a 3D array construction with application to video watermarking. This new
construction uses two main ingredients: an extended rational cycle (ERC) as a shift …

Robust entropy harvester for analogue noise sources in TRNG

H Saleem, S Afzal, N Ahmed - 2018 15th International Bhurban …, 2018 - ieeexplore.ieee.org
Random numbers are important in diverse areas of science and technology. The
requirements of randomness, however, are more stringent in cryptographic applications …

Linear Complexity of Sequences Derived From Hyperelliptic Curves of Genus 2/submitted by Vishnupriya Anupindi

V Anupindi - 2022 - epub.jku.at
Pseudorandom sequences, that is, sequences which are generated with deterministic
algorithms but look random, have many applications, for example in cryptography, in …

Design of LEA: Link encryption algorithm new proposed stream cipher algorithm

HM El Hennawy, AE Omar… - 2014 31st National Radio …, 2014 - ieeexplore.ieee.org
Cryptographic algorithms for confidentiality and authentication play a major important role in
nowadays information security [1]. Encryption algorithms are becoming more necessary to …

Automated Design of Stream Ciphers Using GADS

W Awad, AM Al Hiddi - Improving Information Security Practices …, 2016 - igi-global.com
The main objective of this chapter is to propose a new effective algorithm to design stream
cipher systems automatically using simulated annealing algorithm and genetic programming …

[ΑΝΑΦΟΡΑ][C] Ασφάλεια στο διαδίκτυο των πραγμάτων

Π Παπαζώης - 2019