A survey of lightweight stream ciphers for embedded systems

C Manifavas, G Hatzivasilis, K Fysarakis… - Security and …, 2016 - Wiley Online Library
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …

Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties

PK Behera, S Gangopadhyay - Evolutionary Intelligence, 2022 - Springer
Boolean functions are used as nonlinear filter functions and combiner functions in several
stream ciphers. The security of these stream ciphers largely depends upon cryptographic …

A proposed Development of Clock Control Stream Cipher based on Suitable Attack

SB Sadkhan - 2020 1st. Information Technology to Enhance e …, 2020 - ieeexplore.ieee.org
The feedback shift registers (FSR) is known to allow produce sequences with large period
and fast realization. It is well known that building block used for constructing a key-stream …

A security framework for military application on infrastructure based wireless sensor network

S Roy, MJ Nene - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
This paper presents an overview on design of a security framework for Wireless Sensor
Network (WSN). This framework is proposed for an infrastructure based deployment of the …

Stream cipher based on chaotic maps

EL Mohaisen, RS Mohammed - 2019 First International …, 2019 - ieeexplore.ieee.org
Information Security has still the aim of many agencies and organisations. They have great
attention to cryptosystems to ensure the security of their information. So, scientists and …

[PDF][PDF] Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium

L Diedrich, P Jattke, L Murati, M Senker… - …, 2016 - download.hrz.tu-darmstadt.de
In this paper we compare four lightweight stream ciphers, MICKEY 2.0, WG-8, Grain and
Trivium, which can be used for data encryption in the Internet of Things. At first we provide a …

Design and simulation of new one time pad (OTP) stream cipher encryption algorithm

M Nabil, MH Megahed… - Journal of Advanced …, 2018 - akademiabaru.com
Abstract One Time Pad (OTP) is unconditionally secure cryptosystem. The one time pad is a
long sequence of random bits. These bits are combined with the plaintext message to …

Design and simulation of authenticated encryption AENOTP stream cipher algorithm

MN Hussein, MH Megahed… - 2017 13th International …, 2017 - ieeexplore.ieee.org
Securing transmitted data from UAV to Base Station in high bit rate with maximum security
needs Authenticated Encryption. New One Time Pad (OTP) algorithm was designed for high …

Practical seed-recovery of fast cryptographic pseudo-random number generators

F Martinez - International Conference on Applied Cryptography and …, 2022 - Springer
Trifork is a family of pseudo-random number generators described in 2010 by Orue et al. It is
based on Lagged Fibonacci Generators and has been claimed as cryptographically secure …