International audienceThe radio link is a broadcast channel used to transmit data over mobile networks. Because of the sensitivity of this network part, a security mechanism is used to ensure users’ information. For example, the third generation of mobile network security is based on the KASUMI block cipher, which is standardized by the Third Generation Partnership Project (3GPP). This work proposes an optimized and enhanced implementation of the KASUMI block cipher based on a chaotic generator. The purpose is to develop an efficient ciphering algorithm with better performance and good security robustness while preserving the standardization. The proposed design was implemented on several Xilinx Virtex Field Programmable Gate Arrays (FPGA) ...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
BLAKE is a cryptographic hash function proposed as a candidate in SHA-3 contest where he successfull...
International audienceThe radio link is a broadcast channel used to transmit data over mobile networ...
International audienceThe radio link connecting users to network services is one of the most sensiti...
KASUMI block cipher is used for the security part of many synchronous wireless standards. In this pa...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
International audienceIn this paper, we come up with three secure chaos-based stream ciphers, implem...
International audienceIn this study, with an FPGA-board using VHDL, we designed a secure chaos-based...
International audienceChaosbased stream cipher (CSC) has caught the attention of various security...
International audienceIn mobile networks, sensitive information is transmitted over the radio link b...
In this paper, we propose a hardware implementation of a Feed-Back Chaotic Synchronization (FCS) for...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
BLAKE is a cryptographic hash function proposed as a candidate in SHA-3 contest where he successfull...
International audienceThe radio link is a broadcast channel used to transmit data over mobile networ...
International audienceThe radio link connecting users to network services is one of the most sensiti...
KASUMI block cipher is used for the security part of many synchronous wireless standards. In this pa...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
International audienceIn this paper, we come up with three secure chaos-based stream ciphers, implem...
International audienceIn this study, with an FPGA-board using VHDL, we designed a secure chaos-based...
International audienceChaosbased stream cipher (CSC) has caught the attention of various security...
International audienceIn mobile networks, sensitive information is transmitted over the radio link b...
In this paper, we propose a hardware implementation of a Feed-Back Chaotic Synchronization (FCS) for...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
BLAKE is a cryptographic hash function proposed as a candidate in SHA-3 contest where he successfull...