Sign Up to like & get
recommendations!
1
Published in 2017 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-016-2357-2
Abstract: With the growth of www, cloud computing paradigm has become a massive computing environment as a pay-per-use model to the user with shared pool of resources. It also provides on time demand services from anywhere…
read more here.
Keywords:
methodology;
dynamic updation;
stream cipher;
secure ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2744670
Abstract: Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone…
read more here.
Keywords:
protocol;
encryption;
stream cipher;
cloak ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Circuits and Systems for Video Technology"
DOI: 10.1109/tcsvt.2022.3172226
Abstract: Reversible data hiding in encrypted images (RDHEI), an essential branch of reversible data hiding (RDH), has been in development for more than a decade. For most existing stream-cipher-based RDHEI algorithms, encryption schemes are often not…
read more here.
Keywords:
encrypted images;
rdhei algorithms;
stream cipher;
data hiding ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Optics letters"
DOI: 10.1364/ol.471555
Abstract: We propose and experimentally study a novel, to the best of our knowledge, quantum noise stream cipher (QNSC) secure transmission scheme based on the delta-sigma modulation (DSM) technique. The cooperation of the QNSC and DSM…
read more here.
Keywords:
based delta;
quantum noise;
noise stream;
delta sigma ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Applied Sciences"
DOI: 10.3390/app11020625
Abstract: In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of…
read more here.
Keywords:
secure;
implementation;
stream cipher;
generator ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2021 at "Applied Sciences"
DOI: 10.3390/app11209646
Abstract: In the last three decades, the RC4 has been the most cited stream cipher, due to a large amount of research carried out on its operation. In this sense, dissimilar works have been presented on…
read more here.
Keywords:
avalanche properties;
measuring avalanche;
stream;
stream cipher ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Entropy"
DOI: 10.3390/e24050667
Abstract: In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era. Then, we will describe the positioning of…
read more here.
Keywords:
cryptography;
stream cipher;
quantum;
quantum stream ... See more keywords