The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
Due to the latest changes in observing the external network related threats within the stream cipher, it become necessary to address these threats in order to identify the generator suitable for avoiding such threats. In this paper, the researcher addresses the current threats of immunity attacks in...
| Main Authors: | Mostafa, Saifuldun, Saad, Hayder, Mustafa, Musa Jaber, Ali, Mohammed Hasan, Dhafer, Karam |
|---|---|
| Other Authors: | Hamzah Asyrani, Sulaiman |
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer International Publishing
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/6140/ http://umpir.ump.edu.my/id/eprint/6140/1/The%20Design%20Trends%20of%20Keystream%20Generator%20for%20Stream%20Cipher%20for%20High%20Immunity%20Attacks.pdf |
Similar Items
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
On rainbow vertex antimagic coloring and its application to the encryption keystream construction
by: Agustin, Ika Hesti, et al.
Published: (2024)
by: Agustin, Ika Hesti, et al.
Published: (2024)
Hardware implementation of RC4A stream cipher
by: Al Noman, Abdullah, et al.
Published: (2009)
by: Al Noman, Abdullah, et al.
Published: (2009)
Comparison analysis of stream cipher algorithms for digital communication
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A new method for generating cryptographically strong sequences of pseudo random bits for stream cipher
by: Khalifa, Othman Omran, et al.
Published: (2010)
by: Khalifa, Othman Omran, et al.
Published: (2010)
SCDSP: a novel stream cipher with dynamic structure and parameters
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
Hardware Implementation Of Rc4a Stream Cipher Algorithm
by: Al Noman, Abdullah
Published: (2007)
by: Al Noman, Abdullah
Published: (2007)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
RC4A stream cipher for WLAN security: a hardware approach
by: Al Noman, Abdullah, et al.
Published: (2008)
by: Al Noman, Abdullah, et al.
Published: (2008)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Polyalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Monoalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018)
by: Mohd Lokman, Syiham, et al.
Published: (2018)
The Changing trends in the live streaming of Indonesian political debate
by: Wijayanti, Chory Angela, et al.
Published: (2024)
by: Wijayanti, Chory Angela, et al.
Published: (2024)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009)
by: RezaeiPour , Davood, et al.
Published: (2009)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Vehicles Speed Estimation Model from Video Streams for Automatic Traffic Flow Analysis Systems
by: Arriffin, Maizatul Najihah, et al.
Published: (2023)
by: Arriffin, Maizatul Najihah, et al.
Published: (2023)
Detecting resource consumption attack over MANET using an artificial immune algorithm
by: Abdelhaq, Maha, et al.
Published: (2011)
by: Abdelhaq, Maha, et al.
Published: (2011)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
Lightweight block ciphers: A comparative study
by: Salim, Sufya, et al.
Published: (2012)
by: Salim, Sufya, et al.
Published: (2012)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A new 128-bit block cipher
by: Mohd Ali, Fakariah Hani
Published: (2009)
by: Mohd Ali, Fakariah Hani
Published: (2009)
A block cipher based on genetic algorithm
by: Zakaria, Nur Hafiza
Published: (2016)
by: Zakaria, Nur Hafiza
Published: (2016)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Fault Analysis of the KATAN Family of Block Ciphers
by: Abdul Latip, Shekh Faisal
Published: (2012)
by: Abdul Latip, Shekh Faisal
Published: (2012)
Vehicles Speed Estimation Model from Video Streams for Automatic Traffic Flow Analysis Systems
by: Arriffin, Maizatul Najihah, et al.
Published: (2023)
by: Arriffin, Maizatul Najihah, et al.
Published: (2023)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Similar Items
-
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011) -
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
On rainbow vertex antimagic coloring and its application to the encryption keystream construction
by: Agustin, Ika Hesti, et al.
Published: (2024) -
Hardware implementation of RC4A stream cipher
by: Al Noman, Abdullah, et al.
Published: (2009) -
Comparison analysis of stream cipher algorithms for digital communication
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)