A new method for generating cryptographically strong sequences of pseudo random bits for stream cipher
The increasing privacy risks associated with the recent growth of multimedia streaming applications raised a big industry demand for secure and efficient stream cipher. The fact that stream ciphers do not expand messages, and tolerant to biterrors, make it highly desirable for many communication...
| Main Authors: | Khalifa, Othman Omran, Abumuala, Mohammed, Hassan Abdalla Hashim, Aisha |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/5920/ http://irep.iium.edu.my/5920/1/05556778.pdf |
Similar Items
Randomness analysis of pseudo random noise generator using 24-bits LFSR
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
An overview of scalable video streaming
by: Abumuala, Mohammed, et al.
Published: (2011)
by: Abumuala, Mohammed, et al.
Published: (2011)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
A new 128-bit block cipher
by: Mohd Ali, Fakariah Hani
Published: (2009)
by: Mohd Ali, Fakariah Hani
Published: (2009)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
by: Abidin, A.F.A., et al.
Published: (2011)
by: Abidin, A.F.A., et al.
Published: (2011)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Hardware implementation of RC4A stream cipher
by: Al Noman, Abdullah, et al.
Published: (2009)
by: Al Noman, Abdullah, et al.
Published: (2009)
Comparison analysis of stream cipher algorithms for digital communication
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
SCDSP: a novel stream cipher with dynamic structure and parameters
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
Hardware Implementation Of Rc4a Stream Cipher Algorithm
by: Al Noman, Abdullah
Published: (2007)
by: Al Noman, Abdullah
Published: (2007)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Video streaming based on temporal frame transcoding
by: Fadlallah, Fadlallah Ali, et al.
Published: (2016)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2016)
Streaming video based on temporal frame transcoding
by: Fadlallah , Fadlallah Ali, et al.
Published: (2016)
by: Fadlallah , Fadlallah Ali, et al.
Published: (2016)
Video streaming based on frames skipping and interpolation techniques
by: Fadlallah, Fadlallah Ali, et al.
Published: (2016)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2016)
Video streaming based on frame skipping and interpolation techniques
by: Fadlallah , Fadlallah Ali, et al.
Published: (2016)
by: Fadlallah , Fadlallah Ali, et al.
Published: (2016)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
RC4A stream cipher for WLAN security: a hardware approach
by: Al Noman, Abdullah, et al.
Published: (2008)
by: Al Noman, Abdullah, et al.
Published: (2008)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Video streaming over Ad hoc on-demand distance vector
routing protocol
by: Khalifa, Othman Omran, et al.
Published: (2019)
by: Khalifa, Othman Omran, et al.
Published: (2019)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
Methods For Generating Cryptographic Keys From Online Hand Signatures
by: Yip, Wai Kuan
Published: (2007)
by: Yip, Wai Kuan
Published: (2007)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Noise modulated cryptographic generation for use in UWB wireless communication
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
A note on some strongly sequence spaces
by: Savas, Ekrem, et al.
Published: (2011)
by: Savas, Ekrem, et al.
Published: (2011)
Strongly almost lacunary I-convergent sequences
by: Kilicman, Adem, et al.
Published: (2013)
by: Kilicman, Adem, et al.
Published: (2013)
Video streaming over WiMAX networks
by: Maki Mohd Ahmed, Sheraz Maki Mohd Ahmed, et al.
Published: (2014)
by: Maki Mohd Ahmed, Sheraz Maki Mohd Ahmed, et al.
Published: (2014)
Performance evaluation of ad hoc on-demand distance vector routing protocol under video streaming
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2018)
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2018)
Pseudo Randomized Search Strategy (PRSS*) of the ambiguity function mapping
by: Hassan, Azmi
Published: (1998)
by: Hassan, Azmi
Published: (1998)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Similar Items
-
Randomness analysis of pseudo random noise generator using 24-bits LFSR
by: Yaacob, Siti Hazwani, et al.
Published: (2014) -
An overview of scalable video streaming
by: Abumuala, Mohammed, et al.
Published: (2011) -
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011) -
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013) -
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)