[HTML][HTML] LEA: link encryption algorithm proposed stream cipher algorithm
HMS El Hennawy, AEA Omar, SMA Kholaif - Ain Shams Engineering …, 2015 - Elsevier
Cryptographic algorithms for confidentiality and authentication play a major important role in
nowadays information security Sen (2012)[1]. Encryption algorithms are becoming more …
nowadays information security Sen (2012)[1]. Encryption algorithms are becoming more …
[ΒΙΒΛΙΟ][B] Sequential Experiments with Primes
M Caragiu - 2017 - Springer
This book is actually about the mathematical life and destiny of mathematics faculty and their
talented students in small undergraduate colleges (not necessarily the elite ones, which are …
talented students in small undergraduate colleges (not necessarily the elite ones, which are …
[HTML][HTML] Arrays composed from the extended rational cycle
We present a 3D array construction with application to video watermarking. This new
construction uses two main ingredients: an extended rational cycle (ERC) as a shift …
construction uses two main ingredients: an extended rational cycle (ERC) as a shift …
Robust entropy harvester for analogue noise sources in TRNG
H Saleem, S Afzal, N Ahmed - 2018 15th International Bhurban …, 2018 - ieeexplore.ieee.org
Random numbers are important in diverse areas of science and technology. The
requirements of randomness, however, are more stringent in cryptographic applications …
requirements of randomness, however, are more stringent in cryptographic applications …
Linear Complexity of Sequences Derived From Hyperelliptic Curves of Genus 2/submitted by Vishnupriya Anupindi
V Anupindi - 2022 - epub.jku.at
Pseudorandom sequences, that is, sequences which are generated with deterministic
algorithms but look random, have many applications, for example in cryptography, in …
algorithms but look random, have many applications, for example in cryptography, in …
Design of LEA: Link encryption algorithm new proposed stream cipher algorithm
HM El Hennawy, AE Omar… - 2014 31st National Radio …, 2014 - ieeexplore.ieee.org
Cryptographic algorithms for confidentiality and authentication play a major important role in
nowadays information security [1]. Encryption algorithms are becoming more necessary to …
nowadays information security [1]. Encryption algorithms are becoming more necessary to …
Automated Design of Stream Ciphers Using GADS
W Awad, AM Al Hiddi - Improving Information Security Practices …, 2016 - igi-global.com
The main objective of this chapter is to propose a new effective algorithm to design stream
cipher systems automatically using simulated annealing algorithm and genetic programming …
cipher systems automatically using simulated annealing algorithm and genetic programming …