Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of lightweight stream ciphers for embedded systems
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …
everyday objects. The limited resources of these devices and the ever‐present need for …
Survey on cyberspace security
H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …
society has entered the information era. In this era, people live and work in cyberspace …
An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties
PK Behera, S Gangopadhyay - Evolutionary Intelligence, 2022 - Springer
Boolean functions are used as nonlinear filter functions and combiner functions in several
stream ciphers. The security of these stream ciphers largely depends upon cryptographic …
stream ciphers. The security of these stream ciphers largely depends upon cryptographic …
A proposed Development of Clock Control Stream Cipher based on Suitable Attack
SB Sadkhan - 2020 1st. Information Technology to Enhance e …, 2020 - ieeexplore.ieee.org
The feedback shift registers (FSR) is known to allow produce sequences with large period
and fast realization. It is well known that building block used for constructing a key-stream …
and fast realization. It is well known that building block used for constructing a key-stream …
A security framework for military application on infrastructure based wireless sensor network
This paper presents an overview on design of a security framework for Wireless Sensor
Network (WSN). This framework is proposed for an infrastructure based deployment of the …
Network (WSN). This framework is proposed for an infrastructure based deployment of the …
Stream cipher based on chaotic maps
EL Mohaisen, RS Mohammed - 2019 First International …, 2019 - ieeexplore.ieee.org
Information Security has still the aim of many agencies and organisations. They have great
attention to cryptosystems to ensure the security of their information. So, scientists and …
attention to cryptosystems to ensure the security of their information. So, scientists and …
[PDF][PDF] Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
L Diedrich, P Jattke, L Murati, M Senker… - …, 2016 - download.hrz.tu-darmstadt.de
In this paper we compare four lightweight stream ciphers, MICKEY 2.0, WG-8, Grain and
Trivium, which can be used for data encryption in the Internet of Things. At first we provide a …
Trivium, which can be used for data encryption in the Internet of Things. At first we provide a …
Design and simulation of new one time pad (OTP) stream cipher encryption algorithm
M Nabil, MH Megahed… - Journal of Advanced …, 2018 - akademiabaru.com
Abstract One Time Pad (OTP) is unconditionally secure cryptosystem. The one time pad is a
long sequence of random bits. These bits are combined with the plaintext message to …
long sequence of random bits. These bits are combined with the plaintext message to …
Design and simulation of authenticated encryption AENOTP stream cipher algorithm
MN Hussein, MH Megahed… - 2017 13th International …, 2017 - ieeexplore.ieee.org
Securing transmitted data from UAV to Base Station in high bit rate with maximum security
needs Authenticated Encryption. New One Time Pad (OTP) algorithm was designed for high …
needs Authenticated Encryption. New One Time Pad (OTP) algorithm was designed for high …
Practical seed-recovery of fast cryptographic pseudo-random number generators
F Martinez - International Conference on Applied Cryptography and …, 2022 - Springer
Trifork is a family of pseudo-random number generators described in 2010 by Orue et al. It is
based on Lagged Fibonacci Generators and has been claimed as cryptographically secure …
based on Lagged Fibonacci Generators and has been claimed as cryptographically secure …