Results 91 to 100 of about 7,549 (186)

LFSR-based Hashing and Authentication [PDF]

open access: yes, 2007
We present simple and efficient hash functions applicable to secure authentication of information. The constructions are mainly intended for message authentication in systems implementing stream cipher encryption and are suitable for other applications as well.
openaire   +1 more source

Improvement on the XTP public key cryptosystem and communication protocol of provable security

open access: yesTongxin xuebao, 2007
A new trace function was proposed,the XTP public key cryptosystem based on the 3-rd order LFSR se-quence(the so-called XTR3 system) was extended to the XTR4 system based on the 4-th order LFSR sequence.XTR4 key was shorter in length than that of the XTR3
WANG Ze-hui
doaj   +2 more sources

A new SNOW stream cipher called SNOW-V

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment, something that can be expected to be relevant in a ...
Patrik Ekdahl   +3 more
doaj   +1 more source

Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]

open access: yes, 2002
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core  

A survey for light field super-resolution

open access: yesHigh-Confidence Computing
Compared to 2D imaging data, the 4D light field (LF) data retains richer scene’s structure information, which can significantly improve the computer’s perception capability, including depth estimation, semantic segmentation, and LF rendering.
Mingyuan Zhao   +10 more
doaj   +1 more source

Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes [PDF]

open access: yes, 2017
This paper compares the efficiency of various algorithms for implementing quantum resistant public key encryption scheme RLCE on 64-bit CPUs. By optimizing various algorithms for polynomial and matrix operations over finite fields, we obtained several ...
Wang, Yongge
core   +1 more source

Optimized Method for Generating and Acquiring GPS Gold Codes

open access: yesInternational Journal of Antennas and Propagation, 2015
We propose a simpler and faster Gold codes generator, which can be efficiently initialized to any desired code, with a minimum delay. Its principle consists of generating only one sequence (code number 1) from which we can produce all the other different
Khaled Rouabah   +4 more
doaj   +1 more source

Lightweight ciphers based on chaotic Map - LFSR architectures

open access: yes2016 12th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME), 2016
Comment: Proceedings of 2016 12th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME)
Garcia-Bosque, M.   +3 more
openaire   +2 more sources

THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]

open access: yes
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core  

A Search for Good Pseudo-random Number Generators : Survey and Empirical Studies

open access: yes, 2018
In today's world, several applications demand numbers which appear random but are generated by a background algorithm; that is, pseudo-random numbers. Since late $19^{th}$ century, researchers have been working on pseudo-random number generators (PRNGs).
Bhattacharjee, Kamalika   +2 more
core  

Home - About - Disclaimer - Privacy