A survey on stream ciphers for constrained environments

SA Jassim, AK Farhan - 2021 1st Babylon International …, 2021 - ieeexplore.ieee.org
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …

A new approach to implement stream cipher using memristor-based Chua's circuit for secure communication

N Sharma, P Kumar, SK Rai - AEU-International Journal of Electronics and …, 2024 - Elsevier
The advancement in cryptographic algorithms is the primary need for modern secure
communication systems. In secure communication system, the stream cipher serves the …

A new secure encryption algorithm based on RC4 cipher and 4D hyperchaotic Sprott-S system

NM Mohammed, ZN Al-Kateeb - 2022 Fifth College of Science …, 2022 - ieeexplore.ieee.org
The widespread exchange of data in various formulas such as text and images via
multimedia has created a great need for encryption techniques development, that can …

[PDF][PDF] 3D Content Encryption Using Multi-Level Chaotic Maps

NA Ali, AMS Rahma, SH Shaker - Iraqi Journal of Science, 2023 - iasj.net
Nowadays, 3D content is becoming an essential part of multimedia applications, when the
3D content is not protected, hackers may attack and steal it. This paper introduces a …

Image Encryption using Modified RC4 Algorithm

MHS Hasan - 2023 IEEE 3rd International Maghreb Meeting of …, 2023 - ieeexplore.ieee.org
In this paper, we propose a new method for image encryption based on a modified RC4
stream cipher algorithm that scrambles image pixels before applying the XOR encryption …

Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA

ZN Al-Kateeb, M Jader - Multimedia Tools and Applications, 2024 - Springer
Securing confidential data is imperative in the modern digital era, where the escalating
challenges in data security underscore the urgency to provide a secure and efficient …

[PDF][PDF] 3D Polygon Mesh Encryption Based on 3D Lorenz Chaotic Map.

NA Ali, AMS Rahma, SH Shaker - Int. J. Interact. Mob. Technol., 2021 - researchgate.net
The multimedia application developments in recent years lead to the widespread of 3D
model applications. It becomes more popular in various fields as well as exchanging it over …

Modified RC4 algorithm for Improve data protection in cloud environment

EAW Hachim, T Abbas, MT Gaata - … Conference on Information …, 2022 - ieeexplore.ieee.org
The rapid growth of digital technologies that depending on cloud computing has seriously
increased the threats related to information security. This will certainly pose a major threat to …

A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature review, with particular attention paid
to their applicability, importance, contributions, and field strengths. These algorithms include …

A simple chaotic system using signum function

BE Tatlıcıoğlu - Mathematics and Computers in Simulation, 2024 - Elsevier
Abstract Starting from Lorenz System, a simpler system using signum function was obtained,
which shows chaotic behavior. The conditions for stability were explained. Lyapunov and …