International audienceCipher algorithms have been created a long time ago to protect sensitive information. With the evolution of technology, particularly the increase of computational power, the multiplication of devices, the interconnection of those devices, ciphers need to be created and/or enhanced to match challenges brought by this new environment. In general, chaos-based stream ciphers have three shortcomings: their implementation is not constant-time, they have weak keys, and are not portable. We show in this paper how to overcome those three limitations in the case of our stream cipher. The stream cipher performance including statistical analysis and computational performance are carried out and compared to state-of-the-art algorit...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...