Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Measuring avalanche properties on RC4 stream cipher variants
EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Applied Sciences, 2021 - mdpi.com
In the last three decades, the RC4 has been the most cited stream cipher, due to a large
amount of research carried out on its operation. In this sense, dissimilar works have been …
amount of research carried out on its operation. In this sense, dissimilar works have been …
RC4-AccSuite: A hardware acceleration suite for RC4-like stream ciphers
We present RC4-AccSuite, a hardware accelerator, which combines the flexibility of an
application specific instruction set processor and the performance of an application specific …
application specific instruction set processor and the performance of an application specific …
Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions
In this work, side-channel attacks (SCAs) are considered as a security metric for the
implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re …
implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re …
[PDF][PDF] A survey on recent cryptographic hash function designs
Hash Functions are important tool in information security over the internet. The hash
functions that are used in various security related applications are called cryptographic hash …
functions that are used in various security related applications are called cryptographic hash …
RC4 state information at any stage reveals the secret key
A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper,
where the nonlinear operation is swap** among the permutation bytes. Explicit formulae …
where the nonlinear operation is swap** among the permutation bytes. Explicit formulae …
A new symmetric cryptography algorithm to secure e-commerce transactions
In this research we have proposed a new self-developed symmetric algorithm called FJ RC-
4, which is derived from RC4. Our studies shown that KSA is the vulnerable stage of RC4 …
4, which is derived from RC4. Our studies shown that KSA is the vulnerable stage of RC4 …
[PDF][PDF] A new variant of RC4 stream cipher
LL Khine - International Journal of Physical and Mathematical …, 2009 - Citeseer
RC4 was used as an encryption algorithm in WEP (Wired Equivalent Privacy) protocol that is
a standardized for 802.11 wireless network. A few attacks followed, indicating certain …
a standardized for 802.11 wireless network. A few attacks followed, indicating certain …
Efficient FPGA implementation of the RC4 stream cipher using block RAM and pipelining
RC4 is a popular stream cipher, which is widely used in many security protocols and
standards due to its speed and flexibility. Several hardware implementations were …
standards due to its speed and flexibility. Several hardware implementations were …
Affine equivalence and non-linearity of permutations over
In this paper, we explore further the non-linearity and affine equivalence as proposed by
Mishra et al.(Non-linearity and affine equivalence of permutations. 2014. http://eprint. iacr …
Mishra et al.(Non-linearity and affine equivalence of permutations. 2014. http://eprint. iacr …