Articles with "stream cipher" as a keyword



Photo by camadams from unsplash

Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy

Sign Up to like & get
recommendations!
Published in 2017 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-016-2357-2

Abstract: With the growth of www, cloud computing paradigm has become a massive computing environment as a pay-per-use model to the user with shared pool of resources. It also provides on time demand services from anywhere… read more here.

Keywords: methodology; dynamic updation; stream cipher; secure ... See more keywords
Photo by camadams from unsplash

CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2744670

Abstract: Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone… read more here.

Keywords: protocol; encryption; stream cipher; cloak ... See more keywords
Photo by camadams from unsplash

A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems for Video Technology"

DOI: 10.1109/tcsvt.2022.3172226

Abstract: Reversible data hiding in encrypted images (RDHEI), an essential branch of reversible data hiding (RDH), has been in development for more than a decade. For most existing stream-cipher-based RDHEI algorithms, encryption schemes are often not… read more here.

Keywords: encrypted images; rdhei algorithms; stream cipher; data hiding ... See more keywords
Photo from wikipedia

DAC/ADC-free 4 × 12.9 Gbit/s 65,536-level quantum noise stream cipher secure optical WDM transmission based on delta-sigma modulation.

Sign Up to like & get
recommendations!
Published in 2022 at "Optics letters"

DOI: 10.1364/ol.471555

Abstract: We propose and experimentally study a novel, to the best of our knowledge, quantum noise stream cipher (QNSC) secure transmission scheme based on the delta-sigma modulation (DSM) technique. The cooperation of the QNSC and DSM… read more here.

Keywords: based delta; quantum noise; noise stream; delta sigma ... See more keywords
Photo from wikipedia

The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator

Sign Up to like & get
recommendations!
Published in 2021 at "Applied Sciences"

DOI: 10.3390/app11020625

Abstract: In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of… read more here.

Keywords: secure; implementation; stream cipher; generator ... See more keywords
Photo from academic.microsoft.com

Measuring Avalanche Properties on RC4 Stream Cipher Variants

Sign Up to like & get
recommendations!
Published in 2021 at "Applied Sciences"

DOI: 10.3390/app11209646

Abstract: In the last three decades, the RC4 has been the most cited stream cipher, due to a large amount of research carried out on its operation. In this sense, dissimilar works have been presented on… read more here.

Keywords: avalanche properties; measuring avalanche; stream; stream cipher ... See more keywords
Photo by camadams from unsplash

Quantum Stream Cipher Based on Holevo–Yuen Theory

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24050667

Abstract: In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era. Then, we will describe the positioning of… read more here.

Keywords: cryptography; stream cipher; quantum; quantum stream ... See more keywords