ABSTRACT: The Stone Cipher is a metamorphic cipher that uses a variable word size and variable-size user’s key. The cipher employs two basic functions; the encryption function and a Pseudo Random Number Generator (PRG) that is based on a specially-developed one-way hash function. Four bit-balanced operations are pseudo-randomly selected to generate the sequence of operations constituting the cipher. These operations are: XOR, INV, ROR, NOP for bitwise xor, invert, rotate right and no operation respectively. The user key is encrypted using the cipher encryption function with agreed-upon initial values then it is used to generate the bit stream required to select these operations. In this work, we provide a Field Programmable Gate Array (FPGA...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electro...
Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits ...
Abstract: The Metamorphic-Key-Hopping GOST Cipher is a metamorphic cipher with a key hopping techniq...
The Chameleon Cipher-192 is a polymorphic cipher that uses a variable word size and variable-size us...
Abstract In section 2, we brief out the types of pseudorandom bit generators, which are used in the ...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
Information security systems must provide high levels of correctness, and reliability. The presented...
The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that a...
There are many problems arises in randomized algorithms whose solutions are fundamentally based on a...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Abstract: The Metamorphic-Enhanced Twofish Cipher is a metamorphic cipher that uses a variable word ...
Abstract — Pseudo Random number Generator(PRNG) is used in various cryptographic applications such ...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electro...
Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits ...
Abstract: The Metamorphic-Key-Hopping GOST Cipher is a metamorphic cipher with a key hopping techniq...
The Chameleon Cipher-192 is a polymorphic cipher that uses a variable word size and variable-size us...
Abstract In section 2, we brief out the types of pseudorandom bit generators, which are used in the ...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
Information security systems must provide high levels of correctness, and reliability. The presented...
The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that a...
There are many problems arises in randomized algorithms whose solutions are fundamentally based on a...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Abstract: The Metamorphic-Enhanced Twofish Cipher is a metamorphic cipher that uses a variable word ...
Abstract — Pseudo Random number Generator(PRNG) is used in various cryptographic applications such ...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electro...
Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits ...