Results 11 to 20 of about 611 (160)

Cross-Sectional Radiological and Reconstructive Anatomy of the Paranasal Sinuses in Normal Mesaticephalic Dogs. [PDF]

open access: yesVet Med Sci
GRAPHICAL ABSTRACT –Preliminary reference information that will contribute to the knowledge of cross‐sectional and reconstructive anatomy of the head region in mesaticephalic dogs. –Discovery of specific 3D reconstructive anatomical structures and morphometric features of the paranasal sinuses.
Turgut N.
europepmc   +2 more sources

Single-cell-eQTL mapping in circulating immune cells reveals genetic regulation of response-associated networks in lung cancer immunotherapy. [PDF]

open access: yesCancer Commun (Lond)
Cancer Communications, Volume 45, Issue 9, Page 1123-1127, September 2025.
Sim H, Park GH, Park WY, Lee SH, Choi M.
europepmc   +2 more sources

A New, Fast Pseudo-Random Pattern Generator for Advanced Logic Built-In Self-Test Structures

open access: yesApplied Sciences, 2021
Digital cores that are currently incorporated into advanced Systems on Chip (SoC) frequently include Logic Built-In Self-Test (LBIST) modules with the Self-Test Using MISR/Parallel Shift Register Sequence Generator (STUMPS) architecture.
Tomasz Garbolino
doaj   +1 more source

SCALABLE LOGIC BIST DESIGN AND ANALYSIS FOR ENHANCED TESTING OF COMBINATIONAL CIRCUITS [PDF]

open access: yesProceedings on Engineering Sciences
The paper introduces a scalable Logic Built-In Self-Test (BIST) approach for combinational circuits, utilizing a Bit Swapping Linear Feedback Shift Register (BS-LFSR) as the test pattern generator.
Suhas Shirol   +3 more
doaj   +1 more source

Revisiting LFSRs for Cryptographic Applications [PDF]

open access: yesIEEE Transactions on Information Theory, 2011
Linear finite state machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is linear feedback shift registers (LFSRs) used in many cryptographic applications such as design of stream ciphers or pseudo-random generation.
Arnault, François   +3 more
openaire   +3 more sources

Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Fast correlation attack, pioneered by Meier and Staffelbach, is an important cryptanalysis tool for LFSR-based stream cipher, which exploits the correlation between the LFSR state and key stream and targets at recovering the initial state of LFSR via a ...
Zhaocun Zhou, Dengguo Feng, Bin Zhang
doaj   +1 more source

Blind Side Channel on the Elephant LFSR

open access: yesProceedings of the 19th International Conference on Security and Cryptography, 2022
Elephant is a finalist to the NIST lightweight cryptography competition. In this paper, the first theoretical blind side channel attack against the authenticated encryption algorithm Elephant is presented. More precisely, we are targetting the LFSR-based counter used internally. LFSRs are classic functions used in symmetric cryptography. In the case of
Houssein Meraneh, Awaleh   +4 more
openaire   +2 more sources

GPS-free synchronized pseudo-random number generators for internet-of-things

open access: yesFrontiers in Computer Science, 2023
IntroductionSecuring wireless communications in internet-of-things (IoT) requires both generation and synchronization of random numbers in real-time. However, resource constraints on an IoT device limit the use of computationally intensive random number ...
Mustafizur Rahman, Shantanu Chakrabartty
doaj   +1 more source

Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm

open access: yesIraqi Journal for Computers and Informatics, 2023
In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the confidentiality of image data holds paramount importance. This
Noor Kareem Jumaa, Abbas Muhammed Allawy
doaj  

Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]

open access: yesJisuanji kexue, 2023
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj   +1 more source

Home - About - Disclaimer - Privacy