Results 91 to 100 of about 7,549 (186)
LFSR-based Hashing and Authentication [PDF]
We present simple and efficient hash functions applicable to secure authentication of information. The constructions are mainly intended for message authentication in systems implementing stream cipher encryption and are suitable for other applications as well.
openaire +1 more source
Improvement on the XTP public key cryptosystem and communication protocol of provable security
A new trace function was proposed,the XTP public key cryptosystem based on the 3-rd order LFSR se-quence(the so-called XTR3 system) was extended to the XTR4 system based on the 4-th order LFSR sequence.XTR4 key was shorter in length than that of the XTR3
WANG Ze-hui
doaj +2 more sources
A new SNOW stream cipher called SNOW-V
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment, something that can be expected to be relevant in a ...
Patrik Ekdahl +3 more
doaj +1 more source
Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core
A survey for light field super-resolution
Compared to 2D imaging data, the 4D light field (LF) data retains richer scene’s structure information, which can significantly improve the computer’s perception capability, including depth estimation, semantic segmentation, and LF rendering.
Mingyuan Zhao +10 more
doaj +1 more source
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes [PDF]
This paper compares the efficiency of various algorithms for implementing quantum resistant public key encryption scheme RLCE on 64-bit CPUs. By optimizing various algorithms for polynomial and matrix operations over finite fields, we obtained several ...
Wang, Yongge
core +1 more source
Optimized Method for Generating and Acquiring GPS Gold Codes
We propose a simpler and faster Gold codes generator, which can be efficiently initialized to any desired code, with a minimum delay. Its principle consists of generating only one sequence (code number 1) from which we can produce all the other different
Khaled Rouabah +4 more
doaj +1 more source
Lightweight ciphers based on chaotic Map - LFSR architectures
Comment: Proceedings of 2016 12th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME)
Garcia-Bosque, M. +3 more
openaire +2 more sources
THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core
A Search for Good Pseudo-random Number Generators : Survey and Empirical Studies
In today's world, several applications demand numbers which appear random but are generated by a background algorithm; that is, pseudo-random numbers. Since late $19^{th}$ century, researchers have been working on pseudo-random number generators (PRNGs).
Bhattacharjee, Kamalika +2 more
core

