A survey on stream ciphers for constrained environments
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …
A new approach to implement stream cipher using memristor-based Chua's circuit for secure communication
The advancement in cryptographic algorithms is the primary need for modern secure
communication systems. In secure communication system, the stream cipher serves the …
communication systems. In secure communication system, the stream cipher serves the …
A new secure encryption algorithm based on RC4 cipher and 4D hyperchaotic Sprott-S system
The widespread exchange of data in various formulas such as text and images via
multimedia has created a great need for encryption techniques development, that can …
multimedia has created a great need for encryption techniques development, that can …
[PDF][PDF] 3D Content Encryption Using Multi-Level Chaotic Maps
Nowadays, 3D content is becoming an essential part of multimedia applications, when the
3D content is not protected, hackers may attack and steal it. This paper introduces a …
3D content is not protected, hackers may attack and steal it. This paper introduces a …
Image Encryption using Modified RC4 Algorithm
MHS Hasan - 2023 IEEE 3rd International Maghreb Meeting of …, 2023 - ieeexplore.ieee.org
In this paper, we propose a new method for image encryption based on a modified RC4
stream cipher algorithm that scrambles image pixels before applying the XOR encryption …
stream cipher algorithm that scrambles image pixels before applying the XOR encryption …
Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA
ZN Al-Kateeb, M Jader - Multimedia Tools and Applications, 2024 - Springer
Securing confidential data is imperative in the modern digital era, where the escalating
challenges in data security underscore the urgency to provide a secure and efficient …
challenges in data security underscore the urgency to provide a secure and efficient …
[PDF][PDF] 3D Polygon Mesh Encryption Based on 3D Lorenz Chaotic Map.
The multimedia application developments in recent years lead to the widespread of 3D
model applications. It becomes more popular in various fields as well as exchanging it over …
model applications. It becomes more popular in various fields as well as exchanging it over …
Modified RC4 algorithm for Improve data protection in cloud environment
The rapid growth of digital technologies that depending on cloud computing has seriously
increased the threats related to information security. This will certainly pose a major threat to …
increased the threats related to information security. This will certainly pose a major threat to …
A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature review, with particular attention paid
to their applicability, importance, contributions, and field strengths. These algorithms include …
to their applicability, importance, contributions, and field strengths. These algorithms include …
A simple chaotic system using signum function
BE Tatlıcıoğlu - Mathematics and Computers in Simulation, 2024 - Elsevier
Abstract Starting from Lorenz System, a simpler system using signum function was obtained,
which shows chaotic behavior. The conditions for stability were explained. Lyapunov and …
which shows chaotic behavior. The conditions for stability were explained. Lyapunov and …